A new, upgraded WMF exploit was posted to the public today and is highly functional. |
Anti-virus companies when they get a sample need to act on that quickly. They don't have time in their competitive environment to be able to go out and coordinate and have a nice little talk about naming. |
Historically, risk is much higher with Windows operating systems than Unix/Linux. How can I say that, look at all the major attacks. Which ones had the greatest likelihood and impact for 2005? Windows hands down. |
If someone starts capitalizing on the crossover worm, and we start to see increased activity, then we can talk about a global threat. It's a little premature at this time. |
In August, 2004, we predicted we'd see exponential growth, and that's exactly what we saw. |
It actually appears to be a pretty good design. |
It is already underway and will be activated unless people get removal tools. If you have opened an e-mail and your computer froze up, you should be very concerned. |
It shows increased activity and viability for future Macintosh-based threats on the Mac OS X platform. |
It's all about hiding it so you can maintain extended control over a computer because then you can profile it and steal more. In today's world, with identity theft running rampant, they need more than just your credit card. They need to get your date of birth and your social to get maximum profit on your computer. So it's about remaining stealthy. |
It's primarily a media term. It's something people are going to read about. |
It's such a small population. Other assets are available to attack. |
Pay for one commercial package and add one or more free programs. Set the primary package to scan all the time and use the second ary programs only when you need them, so they don't conflict. It's like getting a second opinion from a doctor. |
Slowly evolving threats like Grew.A often lead to increased fear, uncertainty and doubt without the help of an intelligence provider. It makes it almost impossible for some to get qualified research data on a worm when there is so much misinformation, aliases, and other data available on the Internet. |
The attack, if it comes, could come anytime after the afternoon and the evening of the 5th. |
The number one thing the majority of the malicious code we're seeing now does is disable or delete anti-virus and other security software. In a lot of cases, once the user clicks on that attachment, it's already too late. |