ANALYSIS – This article shows how hackers can add insult to injury by releasing a Trojan that laughs at you while it erases your files. Originally developed as part of the Usenix network, P2P has become a poster child for bad network behavior – bandwidth consuming, malware carrying, and easy to mis-configure. And this particularly nasty piece of malware only enforces the bad rap. Yet P2P can, and is used for positive, commercial purposes as evidenced by an ongoing stream of announcements from companies like Microsoft, which means that IT must remain vigilant in their task of tracking network activity.
Click here to view the ZeroPaid article.