Malware Infection, Visualized

From malformed PDF to exploit to dropper to infection, what if the people could map out every step that malware takes? Using real-time, kernel-layer visibility tools, the presenters will review all the fun things that happen post-exploit. While exploits change from 0-day to 0-day, the patterns of infection show them that there are other ways to protect against advanced threats, nuisance malware and adware.
Provided by: Topic: Security Date Added: Jul 2015 Format: Webcast

Find By Topic