MITB Attacks: What Works? What Doesn't?
Man-in-the-browser Trojan attacks have evolved over the years and today feature advanced remote access capabilities and superb social engineering. What are the latest trends people encountered in their organisation? How are these new weapons used? What defences work, and what strategies are becoming obsolete?