know the threat. block the vector. stop the malware.

              vectorblog  about  contact

Live Search

 

 


Latest Vectors:

Cyber Weaponization: Internet Arms Development (PDF)

Botnets for Good? Weaponization and Capabilities (& blog entry)

Serendipitous Fuzziness: Research Crossovers 2

A Good Offense? Hippocratic Oath: Good Attacks Revisited (PDF)

Exchange Rates: Privacy Data, What's Your Profile Worth? (PDF)

Rootkits, Rutkowska, Reckoning - Retest: Cutting Malware Losses (PDF) 

Superbugs: Antibacterial Soap & the Net (PDF

 


Hotzone:

in the blog: Redirection & Obfuscation in Personal Websites

Security Related or Not?: IE, Rendering, and Apostrophes (PDF)

A Worm in the News? Skype-based Worm Hits VoIP Users

iPhony: Pop Scamming in 2007 (PDF) iPhone-based Activity

iv news: infectionvectors.com notes and news

 

             

infectionvectors.com

 

infectionvectors.com is dedicated to providing information that will help anyone protect their networks from malicious software. An infection vector generically refers to the mechanism a virus employs to attach itself to a host, with respect to a computer virus, how it invades a machine. 

 

In the world of physics, vectors require direction and magnitude. This site evaluates Internet attacks with a similar standard: to be important to a any organization, malware must have a significant direction (a means of targeting and penetrating the network) and magnitude (an impact worthy of the resources expended in mitigation efforts).

 

 

Copyright ©2009 infectionvectors.com. All rights reserved.

support  disclaimer