Friday, November 11, 2005

Full-Scale Invasion

On their own, viruses, worms, Trojan horses, and cracking methods can encounter problems today when trying to perform their devious deeds, thanks in large part to successful efforts by security software developers.
But years ago, the Morris worm demonstrated the success inherent in a multipronged attack, and recent combinations of malware prove that computer threats can and will skillfully evolve alongside legitimate computer technologies. Blended threats continue to carry and use the tools and methods necessary to infiltrate so-called secure computing systems worldwide, so if you thought you heard the last of the likes of Code Red and Nimda, think again.


Post a Comment

<< Home