Because this exploits particular programs on Windows, rather than Windows itself, your machine can get infected simply by visiting a Web site that's set up to exploit the flaw. |
If you didn't ask for the attachment, don't open it. |
It takes you to one of these cheesy search pages. Someone's [trying] to siphon traffic. |
The days when reactive technology would protect you are gone. |
There is a new front to the war. The attacks went from script kiddy worms that were easy to create and targeted at filling up e-mails to targeted attempts against organizations. |
These new attacks are corporate espionage. |
They can upload stolen information to a hijacked server that isn't connected to them at all. They don't ever have to leave a trail that can be followed back to them. |
This is a business; this is organized crime. People are making money on it. |