Download now Free registration required
Financial motives are triggering a massive explosion of malware variants and spam designed to evade traditional signature-based detection mechanisms. In the early days, it was all about the destructive nature of virus. Today, however, IT management must contend with highly sophisticated spyware. Keyloggers, rootkits and Trojans are the fundamental building blocks of third generation malware that is delivered via spam and infected Web sites. The number of possible variants created for this malware is unlimited and is contributing to exponential growth that is clogging both computers and networks. Computers running slower than usual, rapidly shrinking free space on the hard disk, slower Internet connection due to increased network traffic, or applications starting themselves could be signs of an infection.
- Format: PDF
- Size: 3850.24 KB