play a classic cat and mouse game: They work by checking software against a frequently updated list of potential threats.

Read full news article on Webmonkey