The document discusses advanced persistent threats (APTs) and toxic software. It notes that APTs are planned, illegal projects targeting organizations. APTs often use spear phishing and tailored malware. The document also discusses how trusted software vendors can lose customer trust over time if security issues are not addressed transparently. It proposes that vendors rebuild trust by investing in verification of their software security.