Are we still at the leading edge of this threat?.. I mean, is it a fringe thing, or are we seeing it accelerate?
Vincent Weafer
[Mark Kennedy, a software architect, chimes in: ] And our problem is that when you go that deep to try to extract it, you can render the machine unusable. Then you get blamed, rather than the bad guy... The bad actors are getting really bad.
problem actors deep bad machine guy software
Our job is not to drop anything.
job
It's not dangerous in a sense that it's data destructive
sense data dangerous
threat thing
It's designed to get people's anxieties up,.. Hoaxes spread very rapidly, using psychology to spread the information from computer to computer. It clogs up e-mail servers and e-mail boxes. [Users] are never quite sure what's secure what's not secure.
information psychology computer
Each company has a different view of the world,.. That's why we try to have ratings based on the virus itself.
world company view
What we are saying is that attackers are increasingly targeting your assets and your private information
information
This is a relatively old vulnerability.
vulnerability
By enabling an infected machine to be remotely controlled, this threat opens up the user's identity and computer for potentially malicious purposes.
identity machine computer threat
We determined that a significant amount of these were new machines that were Christmas gifts going online and not getting security patches onto them.
gifts security determined christmas machines
You must log in to post a comment.
There are no comments yet.