Tuesday, January 17, 2006

What do you do with a vulnerability?

This indictment got a lot of press a few days ago. It goes into gory detail about how vulnerabilities might be used to establish and control 'botnets'. There are lots of stories out there, but this actually gets closer to the real truth of it.


Post a Comment

<< back