Mine Is Bigger: When Cybercriminals Compare Tools

Cybercriminals use a growing arsenal of weapons to steal data, remotely control devices and circumvent security systems. This session, based on 100% real and fresh cyber underground discussions and reverse engineering, features two "cybercriminals" battling for the ultimate control of a victim PC.



Etay Maor Fraud Prevention Solutions Manager, Trusteer, an IBM company

← View more Media

This document was retrieved from on Sat, 31 Jan 2015 12:40:43 -0500.
© 2015 EMC Corporation. All rights reserved.