~BD~ <BoaterDave@hotmail.co.uk> wrote in
news:wsSdnW1_TeAo4CbWnZ2dnUVZ8k6dnZ2d@bt.com:
> Dustin Cook wrote:
>
>>
>> Yes.. and? That's not a crime. His website offered a tool which upon
>> installation would disable malwarebytes software. A direct attack, if
>> you will. At that point, his program clearly became malware and was
>> treated as such.
>>
>>
>
> I do not wish to argue about this.
>
> Malwarebytes responded "in kind" IMO.
>
> A user of *either* product/tool is highly unlikely to understand what
> is going on 'behind the scenes' and is putty in the hands of whichever
> facility they choose to employ.
>
> "Bad Guys' *could* take advantage of such a situation to deposit
> malware on someone's machine. The user might never become aware of
> that!
I understand your point of view, and I certainly realize in some
situations this is possible; but.. in this case, the only way that
scenario is going to go down is if pcbutts does something else with
his... cobbled together stolen junk.
Malwarebytes has a team of well respected individuals on staff, I really
couldn't imagine the scenario happening on there end. Sorry.
It's not possible for example to inject "malware" into the update process
of malwarebytes, if that's what you were leaning towards. OTH, it's much
more likely for pcbutts to introduce more destructive batch commands and
delete something else from a persons pc. As he's done this already.
--
"Hrrngh! Someday I'm going to hurl this...er...roll this...hrrngh.. nudge
this boulder right down a cliff." - Goblin Warrior


Reply With Quote