Malicious Malware: Six Ways Cybercriminals Beat Security

The Craftiest Security-Beating Malware

The tactics of cybercriminals has evolved from using malware-carrying spam in a shotgun-like approach to finding doorways into corporate networks to studying prey like a methodical marksman, learning security controls and figuring out ways to bypass them. Over the years, many tools, processes and techniques have emerged to try to stay ahead of the crooks. Most have failed because criminals are adept at bypassing the latest innovation. Trusteer, a security vendor focused on desktop security, has compiled a list of the most innovative malware used to beat the latest defenses. Here are six of the more ingenious malicious apps.

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.