A document instructs the reader to research a newly reported malware variant by visiting the websites of two major malware vendors, noting the name of the variant and how it works according to each site. It asks if the same malware was found on both sites, and if there were any differences in how each vendor reported it.