“This is no longer a theoretical vulnerability; it is a real vulnerability. This is no longer about digital rights management or content protection, this is about people having their PCs taken over.”
Share this quote:
“Steve [Gibson]s concerns are valid, and we are going to address them.”
Share this quote:
“If you choose to let people know what youre listening to, thats your business. If they do it without your permission, its an invasion of privacy.”
Share this quote:
“It can damage the operating system and the operating systems integrity, so it cant reboot at all. As an expert in security, I can say this is bad behavior.”
Share this quote:
“This is Old World crime, but its using new tools.”
Share this quote:
“This vulnerability is rising in popularity among hackers, and it is simple to exploit. This has to be taken very seriously, and time is of the essence. A patch coming out as soon as possible is the responsible thing to do.”
Share this quote:
“[CA is rating the viruses as a low to medium threat and most of its customers have not generally been widely affected by them, Curry says.] We have little to no escalations from customers that have been affected by it, ... We have no one saying, Oh my God Im in trouble, but we do have customers calling up and saying what do I need to know?”
Share this quote:
“We have little to no escalations from customers that have been affected by it. We have no one saying, Oh my God Im in trouble, but we do have customers calling up and saying what do I need to know?”
Share this quote:
“We have a scorecard, and there are 22 points that we go through examining how the software behaves. In this case, XCP is falling down.”
Share this quote:
“It was a whole business model centered around selling this type of software to criminals. The malicious software was created and sold to criminal organizations so they can steal data. Its a lot different from the old days of the virus writer wars of who can gain the most notoriety.”
Share this quote: