CRN: Advanced Persistent Threats: Not-So-Advanced Methods After All
Cybercriminals are taking a more systematic approach with their attack techniques, new IBM report finds
Mar 29, 2013
By Robert Westervelt
Cybercriminals behind heavily funded hacking operations are not necessarily using highly sophisticated malware to gain access to sensitive data or to spy on employees, according to a study released this week by IBM.
Click the URL above to read the full article
Votes:6