O'Reilly logo

How to Defeat Advanced Malware by Simon Crosby, Henry Dalziel

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2

2014 Endpoint Exploitation Trends

Abstract

Before analyzing potential solutions, security teams tasked with protecting critical enterprise assets must track the shifting-attack landscape to understand key attack methods and targets. This chapter covers the growth in zero-day exploitation, and notable and emerging zero-day exploitation techniques.

Keywords

cyber-attack
Microsoft® Internet Explorer
Microsoft Office
Adobe Flash
Action Script Spray
zero day
spear phishing
Adobe Reader sandbox
address space layout randomization (ASLR)
data execution prevention (DEP)
Before analyzing potential solutions, security teams tasked with protecting critical enterprise assets must track the shifting attack landscape to understand key attack methods ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required