Let's leave history behind for a while and focus on todays threats. We are going to find that the methods of spreading haven't changed much since 2005.
Fake ActiveX warnings are still used, Trojans are still spreading the trial versions, and browser exploits are still used to deploy e-threats. We’ll take a closer look at some of these cases and add some new ones to the list as we go.
In order to fully understand the way rogue software gets on users’ computers, let’s look at the way Trojans are spreading. We will take one that’s still