Report: Patched vulnerabilities remain prime exploitation vector Anthony Pell 1 min read Feb 16, 2011 Which is the most popular tactic that cybercriminals uses on their way to infect users with malicious code (malware) and generate yet another botnet? According to a newly released report by M86 Security, thatThe link for this article located at ZDNet Blogs is no longer available. Prev: More background on the US security firm break-in Next: Hacking attacks from China hit energy companies worldwide