While you're feeling generous so with information,please explain how a hole in a browser got transformed into a rootkit so firmly entrenched that the patch sent from Redmond failed to dislodge it at first.
Are we saying the computer in question had all safeguards (or just UAC) disabled? No OS flaw whatsoever... rather, simply a goofy employee (running as full SA user or something?) while connected to the Internet? I simply can't find one news account which suggests that the operator was in any way responsible. (i.e., running in unprotected mode or whatever). I'd think that part would be in large bold letters.
The attack - codenamed Operation Aurora - affected Google and at least 20 other firms, including Adobe, Juniper Networks, Rackspace, Yahoo! and Symantec.
All those companies... plus Symantec too? ...with users running IE6, and UAC turned off? That's the story?
Doesn't square up somehow.
There are ways to get into computers beyond traditional channels. All kinds of computers with complicated code in the OS, there are numerous vulnerabilities. No one is disputing this.
Running, a modern, secure browser, with permissions locked down, and virtually any OS you choose from today is pretty much locked down tight.
Anytime your average user gets some kind of -ware on their machines, it is because of user error.