Just when malware design seemed to have reached a plateau, new and more complex attack techniques have now emerged. For a while, security controls designed to manage spam, viruses, and malware were working, but as a result of this success, the threats they protected against were forced to change. Learn about today’s key security trends and how you can fight against the sophisticated new generation of Internet threats.
in executable files, Zip archives and other binary attachments - attempting to exploit flaws in popular mail clients in order to install their botnet payload onto a computer. The purpose of these botnets were to create specific-use attack platforms meant for sending even more spam, disguising phishing sites used to steal personal information, or executing distributed denial of service attacks (DDoS) against large corporate websites. Shockingly, Bagle and Mytob have all but disappeared in 2007, being