D
Dan W.
Roger said:David H. Lipman said:From: "MowGreen" <[email protected]>
| I'm sorry for posting that trite media hype. " Massive malware run " my
| butt. At least those who frequent seedy pRon sites were aware of the
issue.
|
| As Roger and Karl have pointed out there was/is potential for this
| vulnerability to be exploited still, even though MS did a fine job in
| getting the update out in a timely manner.
|
| The only thing massive about the vuln was the shrill hype coming from
| the so-called "Tech media". The "regular" media just follow along since
| the sensational always is good for ratings and sells papers.
|
| Mowa culpa
|
| MowGreen [MVP 2003-2006]
| ===============
| *-343-* FDNY
| Never Forgotten
| ===============
|
Sorry guys, I just got a report of a US Gov't. computer get infected via
this Exploit while
access a US Gov't. web site.
I am not at liberty, in public, to disclose the infected site and the
infector site.
No need to be sorry about anything Dave.
The dust will probably be settling out for some time, especially if the
reports about the cPanel exploited, perpetrator sites is accurate.
MS has over the past couple years done an amazing job at driving
up patch coverage and driving down time to patch, but millions are
likely not in the loop in any timely way.
Roger
Good point, Roger. The only thing that I could see helping is always
have notification(s) of patches on Microsoft's main web site which I
think Microsoft already always does and for the mainstream media to get
the word out that it is time to patch your computers. I was certainly
relieved that Microsoft did not wait for the second Tuesday of the month
with this patch --- it certainly looks like it is shaping up to be
potentially really terrible if users do not update their system(s).