How can better email worms be created? How can spyware claim more
victims? How can better spam be sent? It turns out that these three questions
are all related. We look at the future threat posed by email worms, spyware,
and spammers that use zombie machines in a new way: sophisticated data mining
of their victims saved email. The end result skirts many defenses, and could
trick even experienced users. We present new defenses that can be deployed now
against this threat.
We are currently acquiring citations for the work deposited into this collection. We recognize the distribution rights of this item may have been assigned to another entity, other than the author(s) of the work.If you can provide the citation for this work or you think you own the distribution rights to this work please contact the Institutional Repository Administrator at firstname.lastname@example.org