Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Bascially there are two attack vectors that have not yet been exploited heavily: Mobile Devices and Instant Messaging. There are some articles that expect that a fully automated IM worm is pretty likely.
One example for this is: https://www.eweek.com/article2/0,1759,1880026,00.asp?kc=EWRSS03129TX1K0000614
Scaring.... Are you ready? There are by the way anti-virus solutions tackling IM as well: https://www.microsoft.com/windowsserversystem/solutions/security/sybari.mspx :-)
Roger
Comments
Anonymous
May 11, 2007
http://webdesignbook.net/forum/viewtopic.php?pid=488#p488 <a href=http://webdesignbook.net/forum/viewtopic.php?pid=488#p488 >garden marker</a> [url=http://webdesignbook.net/forum/viewtopic.php?pid=488#p488]garden marker[/url]Anonymous
May 11, 2007
http://webdesignbook.net/forum/viewtopic.php?pid=488#p488 <a href=http://webdesignbook.net/forum/viewtopic.php?pid=488#p488 >garden marker</a> [url=http://webdesignbook.net/forum/viewtopic.php?pid=488#p488]garden marker[/url]