EMAIL THIS ARTICLE
Detecting the Software Switcheroo
Jon Lasser,

It may be the next big thing in Trojan horse attacks: swapping bad code for good code in transit. Fortunately, there's a defense

From (your information):
Name:   Email:
To:
Name:   Email:
Message:
 

Privacy Statement
Copyright 2006, SecurityFocus