"Johannes Ullrich" is the founder of DShield. DShield is now part of the SANS Institute/SANS Internet Storm Center which he leads since it was created from Incidents.org and DShield back in 2001. In 2005, he was named one of the 50 most powerful people in Networking by Network World Magazine. He is also an instructor for the SANS Institute.

Johannes grew up in Germany and moved to the US where he obtained a Ph.D. in physics from the University at Albany, The State University of New York/University at Albany. His work on x-ray optics was awarded a number of research grants by NASA and the United States Department of Energy/Department of Energy. He also authored a chapter in the Handbook of Optics.

More Johannes Ullrich on Wikipedia.

These are the sort of problems that we typically see when patches don't cooperate well with various third-party software and some of the less used functions of Windows.

This laptop will infect your systems from the inside.

Will connect to a control server to ask for instructions. It scans network neighborhoods and tries to infect them, as well.

More often than not, a patch will actually do more damage than good if you roll it out too quickly without testing it first.

We carefully checked this patch and are 100 percent sure that it is not malicious. The patch is, of course, not as carefully tested as an official patch. But we feel it is worth the risk. We know it blocks all exploit attempts we are aware of.

Users have to kill out of the browser and start over again. This stalled browser creates a DOS (denial of service) condition.

The problem with this attack is that it is so hard to defend against for the average user.

In this case, Microsoft is taking too long.

The vulnerability itself has been known about for a while, but it was only a problem for a denial-of-service attack that would sometimes cause IE to crash. Up until now, no one knew how to mark the code and find it in memory to execute a remote code attack.