sponsored by Kaspersky Lab
Posted:  19 Aug 2009
Published:  19 Aug 2009
Format:  PDF
Length:  12  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:
In this white paper, we will explore what actually happens during a drive-by attack, the lures used to perpetrate attacks, the technology behind the attacks, and the use of drive-by download attacks in personal data theft and computer takeovers.





BROWSE RELATED RESOURCES
Anti-Spyware Software | Data Security | Malware | Security Management | Security Threats | Virus Protection | Vulnerability Management | Worms

View All Resources sponsored by Kaspersky Lab

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement