7 sexy legacy deception techniques that still work today

Image by U.S. DefenseImagery
It’s just a chess match. Who can stay out infront: the IT department defending its network or the rogue bad guys trying to get in and steal information. Here we look back at the various techniques used by the “good guys”. Read CSO’s full story here.
To read this article in full or to leave a comment, please click here
Read more: 7 sexy legacy deception techniques that still work today
Story added 25. August 2015, content source with full text you can find at link above.
More antivirus and malware news?
- Trust Attacks Pose Novel Challenge for Companies
- Shorten labels disruptive technologies as genuine national security threats
- Banking malware using a variety of tricks to evade detection
- UK Court Concludes Teenager Behind Huge Hacking Campaign
- Researchers Find More Malware Delivered via Chinese Tax Software
- Gmail tips: Snoozing, shortcuts, and other time-savers
- Multiple Vulnerabilities in the WordPress Ultimate Member Plugin
- Zoho Applications Manager Plugin CVE-2019-15104 SQL Injection Vulnerability
- Inside AWS’s Crusade Against IP Spoofing and DDoS Attacks
- Australian government still pushing decryption magic bullet