The Operation Aurora attacks against Google, Adobe, Rackspace, Juniper Networks and othersrevealed in early 2010, for example, involved 12 distinct steps. Nine of them were actions that could have been detected or prevented by more comprehensive defences. If any one of these steps had failed, the attack would have failed.
In one step, victims were sent links to malicious websites via email. "The links inside the emails should have been checked by some antivirus or gateways or anything else," Aseev said.
Read full article: http://bit.ly/nL1ziX
No comments:
Post a Comment