“When the contact is established, the virus has full access to
the user’s PC.”
“The BeanHive virus utilizes the user’s Web browser to gain
access to the user’s data.”
“As of late Thursday, the author of the BeanHive virus has only
placed the virus on the Internet as a non-invasive
demonstration…”