The December Storm of WMF: Preparation, Identification, and Containment of Exploits
So, what can be done about vulnerabilities like WMF and their exploits? Ultimately, it will take a combination of good coding practices and automatic defenses to bring what seems to be the explosive spread of malware under control. Like other ills, floods, tornadoes, scam artists, and economic...