1/23/08
Some security predictions for 2008â¦
There are on the web some security expectations for 2008 from known security experts (namely, Anton Chuvakin, Richard Stiennon, and others) ... to distribute <strong class="keyword">malware</strong>, such as the exploitation of vulnerabilities in highly popular web applications (social ... Trojan, one of the most sophisticated pieces of <strong class="keyword">malware</strong> ever seen until now, will finally reveal<br /><br />Posted in <strong><a rel="nofollow" target="_blank" href="http://technorati.com/blogs/http://www.securityresearch.be">Security # Research </a></strong> (<a rel="nofollow" target="_blank" href="http://technorati.com/search/http%3A%2F%2Fwww.securityresearch.be" style="color:#390;"><img src="http://static.technorati.com/images/bubble_h11.gif" alt="View Technorati URL search" style="border:none;"/> 0 links from 0 sites</a>) <br /><br /><img width="1" height="1" src="http://static.technorati.com/y/869298811.gif?anM9MCZyZWY9YXBpfC9zZWFyY2g/cXVlcnk9bWFsd2FyZSZsYW5ndWFnZT1lbiZrZXk9YmYyMjQ5ZjVhOTRmMzY1MmZjNjc0ODBjZWExYjg0MjQmZm9ybWF0PXJzc3wyMHxodHRwOi8vd3d3LnNlY3VyaXR5cmVzZWFyY2guYmUvMjAwOC8wMS8yMy9zb21lLTIwMDgtc2VjdXJpdHktaHR0cHd3d3NlY3VyaXR5cmVzZWFyY2hiZXdwLWFkbWlucG9zdC1uZXdwaHBwcmVkaWN0aW9ucy1vbi10aGUtbmV0LyZ2aXNpdG9yaWQ9LSZ1c2VyaWQ9LSZzZXNzaW9uaWQ9YzE2MmU2YTQwMGVkM2U2ZmI5NTBhNjViYTQwYmJjNGUmdXNlcmNsYXNzPTEmYWJjbGFzcz1hJmFic3dpdGNoPTImbWVtYmVyPS0="/>