The attack, if it comes, could come anytime after the afternoon and the evening of the 5th.
More Quotes from Ken Dunham:
This is not something I would expect to yield very high profits for criminals as compared to other types of financial fraud and extortion that might take place. Many people have backups of their files, and now the code has been cracked.Ken Dunham
It's all about hiding it so you can maintain extended control over a computer because then you can profile it and steal more. In today's world, with identity theft running rampant, they need more than just your credit card. They need to get your date of birth and your social to get maximum profit on your computer. So it's about remaining stealthy.
Ken Dunham
A new, upgraded WMF exploit was posted to the public today and is highly functional.
Ken Dunham
The reality is that there could have been hundreds of thousands of computers with overwritten files today. Instead, we only have a handful of reports, and that is a hands-down victory for the collaborative effort of the security community.
Ken Dunham
The threat level for this vulnerability may be dramatically increased if more automated methods of distribution are found to be successful, such as e-mail or IM or file shares. The impact of attacks may also increase, with more sinister codes being installed as new hackers attempt to leverage the vulnerability to their advantage.
Ken Dunham
Pay for one commercial package and add one or more free programs. Set the primary package to scan all the time and use the second ary programs only when you need them, so they don't conflict. It's like getting a second opinion from a doctor.
Ken Dunham
Readers Who Like This Quotation Also Like:
No matter how big or soft or warm your bed is, you still have to get out of it.Grace Slick
I will be conquered; I will not capitulate.
Samuel Johnson
Together we must learn how to compose differences, not with arms, but with intellect and decent purpose.
Dwight D. Eisenhower