By Dan Ross, CEO, Promisec
Cyber criminals use a variety of techniques to invade an organization and breach confidential data. They seek to penetrate and remain undetected until they are ready to strike, deploying new methods to evade detection and stay one step ahead of anti-virus and anti-malware products that rely on known signatures to be effective.
In the recent attacks on Target, Neiman Marcus, and others, the attackers gained access and then uploaded malicious malware, Dump Memory Grabber, to Windows-based point of sale (POS) machines.
Sign in to read more.