Download now Free registration required
What does a botnet do? Why was Stuxnet a benchmark for data theft? Why should CIOs care about attack strategies? To fend off these threats, enterprise defences will need to move out of the traditional software operating stack to monitor operations from a new vantage point closer to and integral with the hardware. This McAfee white paper looks at the techniques used in recent sophisticated attacks such as Stuxnet and the Zeus botnet, showing the kind of stealth technology hackers are using to exploit vulnerabilities.
- Format: PDF
- Size: 0 KB