Just when malware design seemed to have reached a plateau, new and more complex attack techniques have now emerged. For a while, security controls designed to manage spam, viruses, and malware were working, but as a result of this success, the threats they protected against were forced to change. Learn about today’s key security trends and how you can fight against the sophisticated new generation of Internet threats.
msword application/vnd.ms-exce image/pjpeg image/bmp audio/mpeg application/zip text/calendar application/rtf application/x-zip-compressed application/vnd.ms-powerpoint image/x-png Testing the Waters: Excel and MP3 Spam Spammers use different attachment types for one reason: to get their messages through spam filters. But the message delivery must still be easy for end-users to read, and so spammers experiment to find what is the best approach. These graphs track the spike and quick decline of two of the