VIRUS WARS II
In the last newsletter, “Virus Wars I†I talked about some of the more recent “custom threats†and how the enemy is becoming more professional in their approach to infecting our systems . Today I want to identify these threats and see what we can do to protect ourselves. Instead of scattering links through-out the article, I’m including them all at the end for convenient reference. Believe me, protecting against these threats isn’t easy. The changes we’re seeing in malware can be organized into three basic categories.