Potential Attack Vectors, Part 2: The Current Attack Vector In this post, I share a new use case for the relationship between malware and file extensions.
Potential Attack Vectors, Part 1: Malware sources In this post, I share my findings on the relationship between malware and file extensions.