Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom Lenovo Newsroom Nutanix Newsroom Cisco Live Newsroom HPE Zone Tech Provider Zone

Malicious Malware: Six Ways Cybercriminals Beat Security

Cybercriminals have become adept at going around the latest security defenses. Here's a list of some of the most innovative malware in use today.

1   2   3   ... 8 Next

The Craftiest Security-Beating Malware

The tactics of cybercriminals has evolved from using malware-carrying spam in a shotgun-like approach to finding doorways into corporate networks to studying prey like a methodical marksman, learning security controls and figuring out ways to bypass them. Over the years, many tools, processes and techniques have emerged to try to stay ahead of the crooks. Most have failed because criminals are adept at bypassing the latest innovation. Trusteer, a security vendor focused on desktop security, has compiled a list of the most innovative malware used to beat the latest defenses. Here are six of the more ingenious malicious apps.

1   2   3   ... 8 Next

sponsored resources