Upload

Loading icon Loading...

This video is unavailable.

Client-side threats - Anatomy of Reverse Trojan attacks. Demo 2 (part 2)

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to like High-Tech Bridge (htbridge.com) Channel's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to dislike High-Tech Bridge (htbridge.com) Channel's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to add High-Tech Bridge (htbridge.com) Channel's video to your playlist.

Uploaded on Jun 24, 2011

Client-side threats - Anatomy of Reverse Trojan attacks, by Frédéric Bourla

Client-side vulnerabilities are among the biggest threats facing users. Attackers are going after weaknesses in desktop applications such as browsers, media players, common office applications and e-mail clients to install malicious software, often Trojan horses and rootkits. This document explains in detail these threats while how to prevent them.

Publication page: https://www.htbridge.com/publications...

Next part: http://www.youtube.com/watch?v=dlfAuT...
Prev.part: http://www.youtube.com/watch?v=OQTuls...

Loading icon Loading...

Loading icon Loading...

Loading icon Loading...

Loading icon Loading...

Ratings have been disabled for this video.
Rating is available when the video has been rented.
This feature is not available right now. Please try again later.

Loading icon Loading...

Loading...
Working...
to add this to Watch Later

Add to