Comments on: Malware exploits death of North Korea's Kim Jong-il http://www.welivesecurity.com/2012/01/04/malware-exploits-death-of-north-koreas-kim-jong-il/ News, Views, and Insight from the ESET Security Community Mon, 03 Feb 2014 08:49:00 +0000 hourly 1 http://wordpress.org/?v=3.7 By: Sebastian Bortnik http://www.welivesecurity.com/2012/01/04/malware-exploits-death-of-north-koreas-kim-jong-il/#comment-604 Thu, 05 Jan 2012 20:41:03 +0000 http://blog.eset.com/?p=11052#comment-604 Hi Jack, we don't want to take the risk that innocent users try to take a look and get infected accidentally.

]]>
By: Jack Black http://www.welivesecurity.com/2012/01/04/malware-exploits-death-of-north-koreas-kim-jong-il/#comment-603 Thu, 05 Jan 2012 13:02:28 +0000 http://blog.eset.com/?p=11052#comment-603 Please stop obfuscating malicious URLs and IP addresses.  The bad guys already know what they are – how about letting the good guys know too?

]]>