It's a simple, surgical fix that disables the hidden feature. |
It's a throwback to the early days. We don't often see worms these days that are just out to trash user's data. |
It's been seen more in Europe than in the United States, but it's a worldwide event. |
It's designed to get people's anxieties up, ... Hoaxes spread very rapidly, using psychology to spread the information from computer to computer. It clogs up e-mail servers and e-mail boxes. [Users] are never quite sure what's secure what's not secure. |
It's not dangerous in a sense that it's data destructive, |
It's still a tiny drop in the ocean, but it's growing at an exponential rate. |
Our hope is that the Internet stays very open for everybody; that is the original intent. It's for communication, it's for surfers, it's online; it really allows us to have online communities around the world. |
Our job is not to drop anything. |
Script blocking was developed to detect and protect against VBS script worms that propagated via MS Outlook. |
Setting up this option will alert users to unusual behavior because the user will be asked to confirm the sending of all files. |
The folder was hidden because when the feature was created, hiding the files made sure users weren't confused. |
The Internet opens huge opportunities for communication, sharing information, along with commerce and learning, but it also brings along significant risks, ... We want to offer users easy, step-by-step explanations and recommendations that will allow both individuals and small businesses to navigate safely and securely, armed with the knowledge and technology needed to prevent them from possibly becoming victims of cyber crime. |
The Internet opens huge opportunities for communication, sharing information, along with commerce and learning, but it also brings along significant risks. We want to offer users easy, step-by-step explanations and recommendations that will allow both individuals and small businesses to navigate safely and securely, armed with the knowledge and technology needed to prevent them from possibly becoming victims of cyber crime. |
The lesson here is that if we look at Mac OS X and compare it to, say, Windows XP, we find that, in terms of the number of vulnerabilities, they are actually quite comparable. |
The successful industry practices previously established for sharing virus information demonstrate the effectiveness of cooperation among Internet security experts. |