Monday, November 28, 2005

Lesson V - Blended, Not Stired

Massive military operations such as D-Day are often successful due in large part to their complex attacks from air, land, and sea. Similar invasion methods now thrive in cyberspace, but the enemy is much stealthier than a tank or C-47 bomber.
Blended threats are a relatively new breed of malware (code written for malicious and/or illegal reasons) that is difficult to detect and even harder to thwart. Several of the most devastating Internet-based attacks in recent years used blended tactics to spread infection and cripple computer systems, and because they continue to grow in number and complexity, blended threats are likely to cross your path in one way or another in the near future.

0 Comments:

Post a Comment

<< Home