| http://www.w3.org/ns/prov#value | - After marks get tricked into installing the password-logging malware, their machines began reporting to EC2 for new instructions and updates, according to researchers from CA's internet security business unit.We believe this was a legitimate service that was purchased and compromised via a vulnerability such as a weak password, Don DeBolt, CA's director of threat research, told The Reg.
|