Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Swordmaker
One question I have is: if this was discovered by Symantec researchers, how come it was not posted on Symantec's website—and subject of a Symantec press release? Instead, it's published in an obscure newsletter for Virus researchers, Virus Bulletin, three months after the supposed Denial of Service attack attempt. What gives?

I suspect that this "botnet" did not rise to even Symantec's low standards of important malware.

5 posted on 04/15/2009 9:29:26 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: All

Oh, we can’t read the original article and see what it actually says unless we are willing to fork over $175 for a subscription... Nope, don’t think so.


7 posted on 04/15/2009 9:32:43 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 5 | View Replies ]

To: All
I suspect that this "botnet" did not rise to even Symantec's low standards of important malware.

Symantec on OSX.Iservice:

Wild Level: Low
Number of Infections: 0 - 49
Number of Sites: 0 - 2
Geographical Distribution: Low
Threat Containment: Easy
Removal: Easy
Damage Level: Medium
Payload: Opens a back door on the compromised computer.
Distribution Level: Low

Yep, it's not serious at all... it's FUD!

16 posted on 04/17/2009 6:45:34 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 5 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson