2014 Endpoint Exploitation Trends
Before analyzing potential solutions, security teams tasked with protecting critical enterprise assets must track the shifting-attack landscape to understand key attack methods and targets. This chapter covers the growth in zero-day exploitation, and notable and emerging zero-day exploitation techniques.
Microsoft® Internet Explorer
Action Script Spray
Adobe Reader sandbox
address space layout randomization (ASLR)
data execution prevention (DEP)
Before analyzing potential solutions, security teams tasked with protecting critical enterprise assets must track the shifting attack landscape to understand key attack methods ...
Get How to Defeat Advanced Malware now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.