This resource is no longer available

Cover Image
Today, most companies have guarded their email gateways and broadened their defenses against email-borne malware and malicious spam. Consequently, cybercriminals are developing techniques to infect machines behind-the-scenes by embedding malicious code on innocent websites and luring victims to them.

The large number of attacks that have occurred in the first half of 2009 has proven that attacks are continuing to broaden. While the number of web-based attacks outweighs the attacks through email, financially motivated cybercriminals are turning their attention to Web 2.0 platforms such as Facebook and Twitter and alternative programs and tools such as Adobe Flash and PDFs.

Read this paper to see a carefully documented discussion of recent security threats and attempts by cybercriminals to exploit social networking sites, email, mobile devices, and legitimate websites throughout the first half of 2009.

Vendor:
Sophos
Posted:
Feb 8, 2021
Published:
Jul 6, 2009
Format:
PDF
Type:
White Paper

This resource is no longer available.