Talk With an Expert

The December Storm of WMF: Preparation, Identification, and Containment of Exploits

The December Storm of WMF: Preparation, Identification, and Containment of Exploits (PDF, 2.15MB)Published: 17 Nov, 2006
Created by:
James Voorhees

So, what can be done about vulnerabilities like WMF and their exploits? Ultimately, it will take a combination of good coding practices and automatic defenses to bring what seems to be the explosive spread of malware under control. Like other ills, floods, tornadoes, scam artists, and economic recessions, malware and its purveyors may always be with us. Our job is to minimize the harm.

The December Storm of WMF: Preparation, Identification, and Containment of Exploits