Understanding Hidden Threats: Corrupted Software Files: "Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you would recognize and typically consider safe, so you should take precautions when opening files from other people."
Thursday, June 29, 2006
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment