Mine Is Bigger: When Cybercriminals Compare Tools

Cybercriminals use a growing arsenal of weapons to steal data, remotely control devices and circumvent security systems. This session, based on 100% real and fresh cyber underground discussions and reverse engineering, features two "cybercriminals" battling for the ultimate control of a victim PC.



Etay Maor Fraud Prevention Solutions Manager, Trusteer, an IBM company

← View more Media

This document was retrieved from on Tue, 03 Mar 2015 10:01:00 -0500.
© 2015 EMC Corporation. All rights reserved.