The IT security front is like any war: Secure one battle line and a breach may occur on another. Red flags about malware have become almost a daily occurrence in the virtual world, and the malware lexicon has mushroomed in recent years. Terms like “zombie,” “rootkit,” “worm,” “Trojan,” “spyware,” “botnet” and others are descriptors of…