The days when reactive technology would protect you are gone.

They can upload stolen information to a hijacked server that isn't connected to them at all. They don't ever have to leave a trail that can be followed back to them.

It takes you to one of these cheesy search pages. Someone's [trying] to siphon traffic.

This is a business; this is organized crime. People are making money on it.

Because this exploits particular programs on Windows, rather than Windows itself, your machine can get infected simply by visiting a Web site that's set up to exploit the flaw.

If you didn't ask for the attachment, don't open it.

There is a new front to the war. The attacks went from script kiddy worms that were easy to create and targeted at filling up e-mails to targeted attempts against organizations.