SearchSecurity.com

How to use RAT security flaws to turn the table on attackers

Two interns at Matasano Security exposed security flaws in some of the most widely used remote administration tools, which can supposedly be used to defend against the attackers. Can you explain the RAT security flaws that were discovered and how they can be used for defense purposes?

    Requires Free Membership to View

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement