Evidence of a worm that can infect through exploitation with no person to be blamed.
With DNS hijacking, it's easy to infect users.
You can't use an OpenSSL Linux buffer overflow example from 2002 to reinforce your point.
DNS hijacking still requires a disregard for security that could befall a person doing any number of tasks on the net. Your DNS doesn't magically change by itself.
Arg! What!? Because I'm happy to assume that their plugin has some basic validation rules in it! We don't even know where the password exploit came from. To call it code injection, while accurate, is almost an insult to the people that write proper injection attacks.why is it inconceivable to believe that another, non authorised website can hook into the plugin and pass instruction
Because it is no more of a potential issue than being on the net itself. If you take the time to download illegitimate versions of plugins and programs then more fool you.Why is this not seen as a potential issue.

). this whole beta has been a bit of a mess tbh, though i think they have gotten away with it.
everything else just sticks to the 1 screen as you'd want.
