Terrifying Trojans

Terrifying Trojans

Sometimes a fun game, a friendly email, or an innocuous link can be the most convenient place for an enemy to hide. And its prey is none the wiser—until it strikes. The trojan horse uses many layers of deception to do damage. The ingenuity of these attack
23 Minuten

Beschreibung

vor 3 Jahren

Sometimes a fun game, a friendly email, or an innocuous link can
be the most convenient place for an enemy to hide. And its prey
is none the wiser—until it strikes. The trojan horse uses many
layers of deception to do damage. The ingenuity of these attacks
keeps an alarming pace with the technology we use every day. But
as long as we stick to trusted sites and sources, we can better
the odds against those who use our trusting nature against
us. 

Steve Weisman tells us about how trojans still keep security
professionals on the defensive. Josephine Wolff details how these
attacks have evolved, and keep evolving, to catch victims off
guard. And Yanick Franantonio takes on the new frontier for
trojan attacks. 


If you want to read up on some of our research on trojans, you
can check out all our bonus material over at
redhat.com/commandlineheroes.

Follow along with the episode transcript.   

Weitere Episoden

All Together Now
23 Minuten
vor 3 Jahren
Invisible Intruders
22 Minuten
vor 3 Jahren
Ruthless Ransomers
22 Minuten
vor 3 Jahren
Menace in the Middle
23 Minuten
vor 3 Jahren
Dawn of the Botnets
24 Minuten
vor 3 Jahren

Kommentare (0)

Lade Inhalte...

Abonnenten

15
15