The registry-based threat avoids creating PC files and exploits zero-day threats to hijack compromised computers.from Latest topics for ZDNet in Security http://ift.tt/1Hqq2Dm