Video: Maturing malware - Finjan's threat timeline

Finjan's Yuval Ben-Itzhak talks web editor James Garner through the 2007 security threat timeline and describes how the 'maturing of malware' provides new challenges to information security professionals. From the growth of malicious widgets to the development of 'Trojan 2.0' threats, the new technologies used in cybercrime today require new ways of monitoring and defending against malicious code: not just signature or source-based, but behavioural montioring too.


View All Videos

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.






  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...