Anatomy of Microsoft Windows Vulnerabilities
Let’s take a look at a few well-known Windows attacks and the vulnerabilities that make such attacks possible. It is instructive to examine how real vulnerabilities have been exploited by attackers. Such analysis helps to understand the nature of vulnerabilities and methods of protecting systems from attackers. All of the following attacks are ransomware. Ransomware is a fairly recent type of malicious software that renders files or volumes inaccessible, demanding a ransom payment in exchange for access to the captured resources. Most ransomware encrypts data and demands a payment using cryptocurrency in exchange for the decryption key. But ransomware alone isn’t destructive to computers. All malware ...
Get Security Strategies in Windows Platforms and Applications, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.