Ken Dunham
Ken Dunham
exploit highly posted public today
A new, upgraded WMF exploit was posted to the public today and is highly functional.
afternoon anytime evening
The attack, if it comes, could come anytime after the afternoon and the evening of the 5th.
activity future increased mac shows threats viability
It shows increased activity and viability for future Macintosh-based threats on the Mac OS X platform.
They're bloodsucking mosquitoes. You just can't get them all.
assets available small
It's such a small population. Other assets are available to attack.
birth computer control credit date extended hiding identity maintain maximum profile profit remaining running social steal theft
It's all about hiding it so you can maintain extended control over a computer because then you can profile it and steal more. In today's world, with identity theft running rampant, they need more than just your credit card. They need to get your date of birth and your social to get maximum profit on your computer. So it's about remaining stealthy.
identified increases likelihood widespread
This increases the likelihood of exploitation, but widespread exploitation has not been identified to date.
media people primarily
It's primarily a media term. It's something people are going to read about.
close date earlier found gotten group inside likely maybe might police sober version
Then, we thought maybe the police had gotten inside the group that made Sober and might be close to an arrest. But now it's likely that they found a date coded inside an earlier version of the worm.
proven social threat type worm written
This is a social engineering worm written in Russian. It is interesting when you look at it. This is a Java-based type of threat and it has been proven to be successful. We need to look at this and see what is going to be the threat down the road.
code compared criminals expect financial fraud high might people profits types yield
This is not something I would expect to yield very high profits for criminals as compared to other types of financial fraud and extortion that might take place. Many people have backups of their files, and now the code has been cracked.
attacks concerned targeted threats trend
This is one of those big, under-the-radar threats that we've been concerned about. There has been a trend away from big-bang attacks to very targeted and sophisticated attacks that take place right under your nose. This is one of them.
attacks macintosh might serve
This could serve as a springboard for more attacks on the Macintosh because it might spawn copycats.
dangerous site whether
There's no way for you to know whether a site is dangerous for a WMF exploit.