" Dr.Web malware specialists have not disclosed how this malware infects Linux computers." I won't be changing any aspect of my use of Linux until I have some more details on the above .... .... but I will be watching these folders in the meantime ..... - $HOME/$DATA/.mozilla/firefox/profiled - $HOME/$DATA/.dropbox/DropboxCache
True Jones. Never mind my scoffing and uninformative post. Just a tad annoyed by the little info provided by Dr. Web.
@Baserk agreed on that much. Honestly, "have not disclosed" (as opposed to "do not yet know") does not inspire confidence.
This sounds like #$#$ to me. How often has someone stated they hacked something but when NO technical stuff follows it turns out to be fluff (using a nice word instead of actual)! My workspace is all TBB in VM's so I am not losing any sleep.
Such devious ingenuity from dr web.Scare linux users into "buying" their av product. Try asking on an security companies website or forum if linux needs an av and of course they will say yes. So saddening to see scare tactics still being employed by security companies.
Another news from DrWeb. It looks like they've started targeting Linux market. http://news.softpedia.com/news/simple-yet-efficient-linux-backdoor-trojan-discovered-499371.shtml
Boo-hoo. Does anyone know how these infect the OS? I cannot imagine a remote exploit for Linx ATM, unless the sysAdmin is irresponsible and set a weak passphrase for SSH, for example. Code: and put a dent in Linux's status as impermeable when it comes to malware Only people without good knowledge believe this kind of status. No OS is impermeable, specially if the admin is a derp