MITB Attacks: What Works? What Doesn't?

  • Wednesday, October 10, 2012 | 12:10 – 12:50 | Discussion Group Area D

View all Sessions

Man-in-the-browser Trojan attacks have evolved over the years and today feature advanced remote access capabilities and superb social engineering. What are the latest trends people encountered in their organisation? How are these new weapons used? What defences work, and what strategies are becoming obsolete?


This document was retrieved from on Fri, 27 Nov 2015 06:48:04 -0500.
© 2015 EMC Corporation. All rights reserved.