Over the past decade we are witnessing an ever-increasing amount of cyberattacks on the Internet. Prolific, ingenious, and ranging in style from large-scale worms to 'below the radar' phishing attempts, cyberattacks have evolved to unprecedented levels of sophistication. To counter these cyberattacks, defenders are (mostly) developing safeguards, after the attack was made. In the meantime, while defenders are busy with mending the fences, attackers had already developed and planned their next strike