|13 Jan 2011||#1|
| || |
Targeted attacks - going beyond the technicalities Over 30,000 people
Security Art's Iftach Ian Amit discusses targeted attacks and how you should go beyond just technology to defend against them.
Some people might be surprised to hear that most targeted attacks aren't directed at a specific individual or item of equipment. Although some strive to reach such victims, normally they focus on a small group of individuals or systems in order to carry out their task.
Targeted attacks are also tasked with greater goals than a traditional attack. For instance, they may intend to steal specific documentation, access custom systems, control or modify information, etc.), but they're not actually that technologically different from "traditional" attacks.
In my experience of the clients we have helped at Security Art, some attacks do utilize some of the most ingenious technologies and techniques. But at the end of the day, when you scrape off the "cool cloak" (custom hiding techniques to make the code bypass security technologies), you realize that we are still dealing with the same vulnerabilities, and the same rootkit and Trojan techniques.
|My System Specs|
|Similar help and support threads for2: Targeted attacks - going beyond the technicalities Over 30,000 people|
|Recently patched Java flaw already targeted in mass attacks||Security News|
|Adobe confirms targeted attacks due to security hole in Reader||Security News|
|Java zero day vulnerability actively used in targeted attacks||Security News|
|MacControl Trojan Being Used in Targeted Attacks Against OS X Users||Security News|
|Targeted domain controller attacks increase 150%||Security News|
|MSFT Confirms'Targeted attacks' against old unpatched IE vulnerability||Browsers & Mail|
|Targeted attacks against recently addressed Microsoft Office||Security News|
|Our Sites ||Site Links ||About Us ||Find Us |
© Designer Media Ltd
All times are GMT -5. The time now is 11:59 PM.