Ken Dunham
![Ken Dunham](/assets/img/authors/unknown.jpg)
Ken Dunham
plenty ways
There are plenty of ways to get around all of those things.
birth computer control credit date extended hiding identity maintain maximum profile profit remaining running social steal theft
It's all about hiding it so you can maintain extended control over a computer because then you can profile it and steal more. In today's world, with identity theft running rampant, they need more than just your credit card. They need to get your date of birth and your social to get maximum profit on your computer. So it's about remaining stealthy.
attacks attempt automated codes file found hackers impact increased level leverage methods sinister threat
The threat level for this vulnerability may be dramatically increased if more automated methods of distribution are found to be successful, such as e-mail or IM or file shares. The impact of attacks may also increase, with more sinister codes being installed as new hackers attempt to leverage the vulnerability to their advantage.
identified increases likelihood widespread
This increases the likelihood of exploitation, but widespread exploitation has not been identified to date.
proven social threat type worm written
This is a social engineering worm written in Russian. It is interesting when you look at it. This is a Java-based type of threat and it has been proven to be successful. We need to look at this and see what is going to be the threat down the road.
crossover global increased premature starts talk
If someone starts capitalizing on the crossover worm, and we start to see increased activity, then we can talk about a global threat. It's a little premature at this time.
code compared criminals expect financial fraud high might people profits types yield
This is not something I would expect to yield very high profits for criminals as compared to other types of financial fraud and extortion that might take place. Many people have backups of their files, and now the code has been cracked.
boot clean cleaned viruses
You should boot from a clean disk before removing a virus. Some viruses can't be cleaned any other way.
computer opened people removal unless
It is already underway and will be activated unless people get removal tools. If you have opened an e-mail and your computer froze up, you should be very concerned.
add commercial free opinion package pay primary programs second time
Pay for one commercial package and add one or more free programs. Set the primary package to scan all the time and use the second ary programs only when you need them, so they don't conflict. It's like getting a second opinion from a doctor.
dangerous site whether
There's no way for you to know whether a site is dangerous for a WMF exploit.
afternoon anytime evening
The attack, if it comes, could come anytime after the afternoon and the evening of the 5th.
assets available small
It's such a small population. Other assets are available to attack.
likely near past successful taken twelve
WMF exploitation has taken off in the past twelve hours. It's likely that WMF exploitation will be very successful in the near term.