|14 Dec 2013||#1|
Firms Eliminate Embedded Code To Foil Targeted Attacks
Security firms have typically taken one of two approaches to protecting their customers: detect bad code and block it, or validate wanted applications and allow them to run.
Yet determining whether a file, script, or executable binary is malicious is not an easy task, and often defensive technologies have missed the more subtle or sophisticated attacks that insert exploit code as part of a common file format, such as Office or portable document format (PDF) files. While some companies banned scripts as a way to fend off macro viruses in the late '90s and early 2000s, now security firms are finding ways to sanitize common file formats, removing or modifying executable code within the files to stymie attackers.
|My System Specs|
|Similar help and support threads for2: Firms Eliminate Embedded Code To Foil Targeted Attacks|
|Java zero day vulnerability actively used in targeted attacks||Security News|
|MacControl Trojan Being Used in Targeted Attacks Against OS X Users||Security News|
|Targeted domain controller attacks increase 150%||Security News|
|Targeted attacks - going beyond the technicalities Over 30,000 people||Security News|
|Targeted attacks against recently addressed Microsoft Office||Security News|
© Designer Media Ltd
All times are GMT -5. The time now is 04:23 AM.