And Norton does it yet again:
http://safer-networking.org/en/news/2006-01-07.html One day they will get what they have coming.
Lets look at a typical malware identification checklist:
- resist uninstallation (x)
- persist after uninstallation attempts (x)
- reinstall after uninstallation or "by the roots" removal ()
- hide from the user (x)
- hide from the operating system (x)
- hide what they are doing * (x)
- damage the operating system (x)
- replace, interfere with, spoof, or hijack functions such as DNS resolution, home page, file associations and toolbars (x)
- create problems in order to sell you a "fix" for them (x)
Yup, there you have it...
Symantec - The David Hannum of PC software marketing...