Threat Emulation uses a sandbox as a separate, isolated environment in which files are open and run to determine whether they are safe or malicious. In this infographic, we look at its implementation and the technology required to avoid infecting a corporate network.
Cyberspace has become a full-blown war zone as governments across the globe clash for digital supremacy, victories are fought with bits instead of bullets, malware instead of militias, and botnets instead of bombs. In this whitepaper, we look at the unique characteristics of cyber attack campaigns waged by governments worldwide and how security professionals can better identify an attack.
Remote access tools (RATs), require little technical savvy to use however can offer unfettered access to compromised machines. In this report, we take a spotlight to Poison Ivy (PIVY), a RAT that remains popular and effective a full eight years after its release, despite its age and familiarity in IT security circles. Download report.
Copyright 2013 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.