Discussion: Unique attacks highlight Internet espionage trends

Eric Parizo Eric B. Parizo, Executive Editor Profile: Eric Parizo
Tags:
Email attachments
malware
Security
Attackers are using malware samples that researchers have never seen before -- and will never see again -- to successfully steal data from unsuspecting organizations, governments and individuals.

1 Comment on this article

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • LalitBhamare
    Espionage has happened in the past, happens today and will happen tomorrow. Techniques that are applied are the only things which change.
    1,020 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following