Top exploits of 2011

Holly Stewart Microsoft

At the end of 2010, a marked rise in the exploitation of Java vulnerabilities took place. As users adopt more secure computing practices, attackers must move on to easier targets. What are the changes in exploitation techniques for 2011? Using the Microsoft Malware Protection Center (MMPC) global attack data collected from tens of millions of computers in over 200 country/regions, this talk will discuss the most prevalent exploit techniques in use today and new techniques that are on the rise, including variances between geographies, consumer users, and corporate users.

 del.icio.us  digg this! digg this

Quick Links

Poll
Should software vendors extend support for their products on Windows XP beyond the end-of-life of the operating system?
Yes - it keeps their users secure
No - it encourages users to continue to use a less secure OS
I don't know
Leave a comment
View 22 comments

AusCert2014

Jobs
In Virus Bulletin's jobs pages among others:

Virus Bulletin currently has 231,281 registered users.