How to kill Remote Access Trojans

Detecting Remote Access Trojans can be very challenging because they mimic legitimate commercial remote administration tools, open legitimate network ports, and perform very surgical operations that don’t resemble typical malware techniques, says Udi Shamir, CSO and head of SecurityLabs, SentinelOne.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more: How to kill Remote Access Trojans

Story added 6. August 2015, content source with full text you can find at link above.