Introduction: Tools of the Cyberterrorist
Worms, viruses, and Trojan horses used to penetrate the computers of unwitting victims have been around for a long time. Although worms, viruses, and Trojan horses are "oldies but goodies" in a hacker's kit bag, they still can deliver a damaging payload. And now, more ominous forms are appearing that can make previous virus attacks seem like a walk in the park.
The sad part of all these types of attacks is that many known viruses are long-lived because infected users either don't know they're infected or engage in practices that lend themselves to constant re-infection by the same or new viruses. If you look at McAfee's list of the top 10 viruses, you'll see entries for viruses that are over a year old, and yet still make the top 10!