CHAPTER 5: FIGHTING BACK

Criminal use of malware is in the middle of an evolutionary curve. Their capabilities, target platforms and creative uses are about to enter a period of rapid change and deeper, enhanced infection vectors. Organizations without the capability to identify anomalies in their environment via monitoring tools and honeypot technologies will simply become the most compromised victims in the long term.

L. Brent Huston, @lbhuston, CEO and Security Evangelist, MicroSolved, Inc.

How to protect yourself from botnet infections

Secure software and smart security practices, such as the ones listed below, are the keys to protecting yourself and your system from cyber theft and from becoming a zombie computer in a bot network.

  • Antivirus ...

Get An Introduction to Hacking and Crimeware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.