New attack tricks antivirus software / | |
Autor: | Heyman, Karen. |
Tema(s): | |
Resumen: | Traditionally, antivirus products stop malicious software by recognizing code signatures unique to different types of malware. When the applications encounter a file with a code string that matches one in their database for a known virus, they block its access to the intended victim's computer. However, with the advent of web 2.0 (see the sidebar "DCO and Web 2.0"), in which web sites make it easy for users to add content, hackers have found a new way to spread malicious code and short-circuit the pattern matching antivirus approach |
No hay ítems correspondientes a este registro
SOLICITAR EL ARTICULO EN EL PROGRAMA DE ELECTRONICA Y TELECOMUNICACIONES
Electrónica y Telecomunicaciones
Sistemas
Traditionally, antivirus products stop malicious software by recognizing code signatures unique to different types of malware. When the applications encounter a file with a code string that matches one in their database for a known virus, they block its access to the intended victim's computer. However, with the advent of web 2.0 (see the sidebar "DCO and Web 2.0"), in which web sites make it easy for users to add content, hackers have found a new way to spread malicious code and short-circuit the pattern matching antivirus approach
No hay comentarios en este titulo.
Ingresar a su cuenta para colocar un comentario.