Provided by: SecurityTube.net
Date Added: Jul 2015
From malformed PDF to exploit to dropper to infection, what if the people could map out every step that malware takes? Using real-time, kernel-layer visibility tools, the presenters will review all the fun things that happen post-exploit. While exploits change from 0-day to 0-day, the patterns of infection show them that there are other ways to protect against advanced threats, nuisance malware and adware.