New cloaked-code threat to security
The cloaking technique is aimed at foiling the pattern-recognition intelligence used by many intrusion detection systems, or IDSes, known as the burglar alarms of the Internet.
"Trust me, this will blow away any pattern matching," said K2, who would not reveal his real name because he also works as a security consultant.
When a security hole is found on a corporate network, hackers usually will find several ways to exploit it. To manage the onslaught, the makers of intrusion-detection systems continually update their own software to keep track of new variants of an already familiar theme.
The link for this article located at ZDNet is no longer available.