Top exploits of 2011

Holly Stewart Microsoft

  download slides (PDF)

At the end of 2010, a marked rise in the exploitation of Java vulnerabilities took place. As users adopt more secure computing practices, attackers must move on to easier targets. What are the changes in exploitation techniques for 2011? Using the Microsoft Malware Protection Center (MMPC) global attack data collected from tens of millions of computers in over 200 country/regions, this talk will discuss the most prevalent exploit techniques in use today and new techniques that are on the rise, including variances between geographies, consumer users, and corporate users.



twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.