know the threat. block the vector. stop the malware.

              vectorblog  about  contact

Live Search



Latest Vectors:

Cyber Weaponization: Internet Arms Development (PDF)

Botnets for Good? Weaponization and Capabilities (& blog entry)

Serendipitous Fuzziness: Research Crossovers 2

A Good Offense? Hippocratic Oath: Good Attacks Revisited (PDF)

Exchange Rates: Privacy Data, What's Your Profile Worth? (PDF)

Rootkits, Rutkowska, Reckoning - Retest: Cutting Malware Losses (PDF) 

Superbugs: Antibacterial Soap & the Net (PDF



in the blog: Redirection & Obfuscation in Personal Websites

Security Related or Not?: IE, Rendering, and Apostrophes (PDF)

A Worm in the News? Skype-based Worm Hits VoIP Users

iPhony: Pop Scamming in 2007 (PDF) iPhone-based Activity

iv news: notes and news


      is dedicated to providing information that will help anyone protect their networks from malicious software. An infection vector generically refers to the mechanism a virus employs to attach itself to a host, with respect to a computer virus, how it invades a machine. 


In the world of physics, vectors require direction and magnitude. This site evaluates Internet attacks with a similar standard: to be important to a any organization, malware must have a significant direction (a means of targeting and penetrating the network) and magnitude (an impact worthy of the resources expended in mitigation efforts).



Copyright ©2009 All rights reserved.

support  disclaimer