sponsored by ESET
Posted:  16 Mar 2011
Published:  16 Mar 2011
Format:  PDF
Length:  8  Page(s)
Type:  eGuide
Language:  English

The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Stuxnet is similar to the Operation Aurora attacks from December 2009 and the Zeus botnet in that it demonstrates cutting-edge techniques in the way malware is created. However, Stuxnet is more sophisticated, primarily because it exploits several zero-day vulnerabilities at once. While it's always hard to predict the future of malware, it's safe to say this won't be the last attack that utilizes multiple zero-day exploits simultaneously. In this tip, we'll discuss this tactic in the context of Stuxnet, and explain how enterprises can fend off similar exploits in the future.

Firewall Management | Intrusion Detection | Malware | Security Threats | Virus Protection | Worms

View All Resources sponsored by ESET

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement