SearchSecurity.com

Prepare for Shamoon malware with data backup and recovery plan

The destructive nature of the Shamoon malware has my team concerned about data-destroying malware that targets enterprises. How does data-destroying malware differ from other strands, and are there any unique detection mechanisms that can be implemented, specifically around how the malware may interact with data?

    Requires Free Membership to View

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement