. . . "Hackers deploy diverse tools in perpetrating the attacks, such as viruses, worms and Trojans, exploiting corporate security weaknesses in their firewalls, routers, servers and other systems that allow for unauthorized penetration of networks." . .