This page no longer in use. Please go to the new IBM Security Threat Research page.