Dark Reading: Tech Insight: Layering Up For Malware Protection
No one layer of threat detection technology can sufficiently protect the enterprise today from malicious code - a look at five best practices

Jan 21, 2011
By Adam Ely

Malware has traditionally entered the enterprise through two main avenues, Web and email. In the early 2000's, email was the favorite vector for malware writers: controls were low, email was everywhere, and it was easy to convince someone to open an email and run the attachment. Attackers still use email to infect machines, of course, but also have moved to more sophisticated drive-by downloads. They inject their malware into legitimate websites through advertising networks or by compromising the site, and unsuspecting visitors download the malware unknowingly and join the malware creator's army of infected systems.

Click the URL above to read the full article
Comments: 0
Votes:3