[FoRK] Next Generation of Viruses and Attacks

Jeffrey Kay jeff at k2.com
Tue May 24 10:10:30 PDT 2005

After compromising a machine, the attacker encrypts someone’s files and then
demands a ransom payment for the key.

Oh, what fun ...

-- jeff

jeffrey kay <jeff at k2.com> aim <jkayk2>

More information about the FoRK mailing list