To: Swordmaker
One question I have is: if this was discovered by Symantec researchers, how come it was not posted on Symantec's websiteand subject of a Symantec press release? Instead, it's published in an obscure newsletter for Virus researchers,
Virus Bulletin, three months after the supposed Denial of Service attack attempt. What gives?
I suspect that this "botnet" did not rise to even Symantec's low standards of important malware.
5 posted on
04/15/2009 9:29:26 PM PDT by
Swordmaker
(Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
To: All
Oh, we can’t read the original article and see what it actually says unless we are willing to fork over $175 for a subscription... Nope, don’t think so.
7 posted on
04/15/2009 9:32:43 PM PDT by
Swordmaker
(Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
To: All
I suspect that this "botnet" did not rise to even Symantec's low standards of important malware.
Symantec on OSX.Iservice: Wild Level: Low
Number of Infections: 0 - 49
Number of Sites: 0 - 2
Geographical Distribution: Low
Threat Containment: Easy
Removal: Easy
Damage Level: Medium
Payload: Opens a back door on the compromised computer.
Distribution Level: Low
Yep, it's not serious at all... it's FUD!
16 posted on
04/17/2009 6:45:34 PM PDT by
Swordmaker
(Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson