Video: Maturing malware - Finjan's threat timeline

Finjan's Yuval Ben-Itzhak talks web editor James Garner through the 2007 security threat timeline and describes how the 'maturing of malware' provides new challenges to information security professionals. From the growth of malicious widgets to the development of 'Trojan 2.0' threats, the new technologies used in cybercrime today require new ways of monitoring and defending against malicious code: not just signature or source-based, but behavioural montioring too.

 

View All Videos

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close