Saturday, November 26, 2005

Massive Force

Some blended threats use just a few attack methods to spread their infection and inflict damage, whereas others use the everything-but-the-kitchen-sink approach. But consistent patterns of behavior exist across many complex worms, enough so that we can drill down the most common attack techniques found in blended threats. Let’s take a closer look at how these threats victimize computers.


Post a Comment

<< Home