Nytro Posted January 14, 2012 Report Posted January 14, 2012 Blended Attacks Exploits,Vulnerabilities and Buffer-OverflowTechniques in Computer Viruses*By Eric Chien and Péter SzörSymantec Security ResponseINSIDE- Types of Vulnerability- Current and Previous Threats- Current Security- Combating Blended Threats in the FutureNote: This paper was originally published in Virus Bulletin, 2002Old stuff...Download:http://www.symantec.com/avcenter/reference/blended.attacks.pdf Quote