Date: 10/16/07 (Security) Keywords: no keywords Use of encryption key for peer-to-peer traffic, researcher says, could allow creation of smaller networks--and "a lot more of Storm." The owners of the Storm botnet, whose identities are as yet unknown, could be preparing to sell off the "services" of segments of the network, according to Joe...
|