29 Quotes by Ken Dunham

  • Author Ken Dunham
  • Quote

    This could serve as a springboard for more attacks on the Macintosh because it might spawn copycats.

  • Tags
  • Share

  • Author Ken Dunham
  • Quote

    This increases the likelihood of exploitation, but widespread exploitation has not been identified to date.

  • Tags
  • Share

  • Author Ken Dunham
  • Quote

    They're bloodsucking mosquitoes. You just can't get them all.

  • Share

  • Author Ken Dunham
  • Quote

    It's all about hiding it so you can maintain extended control over a computer because then you can profile it and steal more. In today's world, with identity theft running rampant, they need more than just your credit card. They need to get your date of birth and your social to get maximum profit on your computer. So it's about remaining stealthy.

  • Tags
  • Share

  • Author Ken Dunham
  • Quote

    It shows increased activity and viability for future Macintosh-based threats on the Mac OS X platform.

  • Tags
  • Share

  • Author Ken Dunham
  • Quote

    It's primarily a media term. It's something people are going to read about.

  • Tags
  • Share

  • Author Ken Dunham
  • Quote

    Then, we thought maybe the police had gotten inside the group that made Sober and might be close to an arrest. But now it's likely that they found a date coded inside an earlier version of the worm.

  • Tags
  • Share


  • Author Ken Dunham
  • Quote

    The attack, if it comes, could come anytime after the afternoon and the evening of the 5th.

  • Tags
  • Share