Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Zone Intel Partner Connect Digital Newsroom Dell Technologies World Newsroom Dell Technologies Newsroom HP Reinvent 2020 Newsroom IBM Newsroom The IoT Integrator Lenovo Newsroom NetApp Data Fabric Intel Tech Provider Zone

Malicious Malware: Six Ways Cybercriminals Beat Security

Cybercriminals have become adept at going around the latest security defenses. Here's a list of some of the most innovative malware in use today.

1   2   3   ... 8 Next

photo
The Craftiest Security-Beating Malware



The tactics of cybercriminals has evolved from using malware-carrying spam in a shotgun-like approach to finding doorways into corporate networks to studying prey like a methodical marksman, learning security controls and figuring out ways to bypass them. Over the years, many tools, processes and techniques have emerged to try to stay ahead of the crooks. Most have failed because criminals are adept at bypassing the latest innovation. Trusteer, a security vendor focused on desktop security, has compiled a list of the most innovative malware used to beat the latest defenses. Here are six of the more ingenious malicious apps.

 
 
1   2   3   ... 8 Next

sponsored resources