OK, I won't post any of the dozens of links to detailed descriptions of IEDs that I found through google in the last minute and a half.
Back in 1987 I posted an article to Usenet describing a fictitious "malloc worm", to try and convince some people on the Amiga newsgroup that they were way too complacent about UNIX security. A week later the Internet Worm hit... and I have to say I was a mite concerned aboutthe timing, at least up to the point where it became obvious that there was no connection between myself and Robert Morris Junior, and no relationship between myhypothetical worm and the real one. I've since become convinced that it's always in the general public's best interest to understand how malicious software works than to try and hide it.
But as you're the senior here, and I'm the junior, I'll try and refrain from any further implicitly explicit explanations of where malware might hide. 
Anyone who's running a "clean room" Windows box and is depending on the Finder to show him malware is in the wrong business. I shan't go into more detail, out of deference to drval, but you should be able to think of a few tricks.
Last edited: Feb 12, 2007