New Trojan 2.0 Uses Old Web 2.0
The future looks bright for malware, not so their victims, as new distribution methods using RSS, Google text ads and Web 2.0 technologies profilerate. They're more nimble, harder to detect and embedded in web applications.
All of these things add up to another fun year in 2008 for web application security.
And Cisco, in its first ever annual security report, expects the Storm botnet to continue to be active next year, as well.
All of these things add up to another fun year in 2008 for web application security.
And Cisco, in its first ever annual security report, expects the Storm botnet to continue to be active next year, as well.
0 Comments:
Post a Comment
<< Home