Avoiding a hostile host

By on
Avoiding a hostile host

Back in the old days, at least by malicious hacking standards, the simplest way to hijack a PC was to compromise the vulnerable entryways of the operating system.

But network perimeter defenses hardened and security advanced over the last several years, forcing cybercriminals to adapt. Nowadays, the new shiny target is web applications, and attackers are feasting on their inherent weaknesses. Because they rely on an internet browser for user interaction, ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition

Most Read Articles

Log In

|  Forgot your password?