| http://www.w3.org/ns/prov#value | - for Attacks ???Storm has historically been used for spam but the hacker, controlling the trojan, has amassed so many infected hosts in the botnet that its network can easily support activities other than spamming,??? said Stewart. ???We don???t know the motive of the Storm author; however one possible theory could be that the hacker plans to use the trojan for more malicious activity than sending
|