Top exploits of 2011
Holly Stewart Microsoft
At the end of 2010, a marked rise in the exploitation of Java vulnerabilities took place. As users adopt more secure
computing practices, attackers must move on to easier targets. What are the changes in exploitation techniques for 2011?
Using the Microsoft Malware Protection Center (MMPC) global attack data collected from tens of millions of computers in
over 200 country/regions, this talk will discuss the most prevalent exploit techniques in use today and new techniques
that are on the rise, including variances between geographies, consumer users, and corporate users.
del.icio.us digg this