There is a movement today to develop more security building blocks, and this could help by creating a second layer of security beyond the application level. Embedding security in the chip architecture provides protection from the ground up.

Targeted Trojan attacks have much the same effect as conventional Trojans, often opening back doors and covert channels for information theft. What makes targeted Trojans different, though, is that they are made specifically for use against a particular organization or user group.

ISPs can buy off [these vendors] in bulk and resell for pennies per month per mailbox.