Web of deceit

Web of deceit
Web of deceit
Like a beast from a 1950's sci-fi movie, rogue security software preys on victim's anxieties: Pop-up ads start appearing on a monitor proclaiming that the computer system has been infected, and the nervous user is told the "problem" can be fixed by downloading what turns out to be a phony anti-virus product. The scam has been around for years and continues to dupe users. But this is not only an annoyance, it may be destabilizing the industry as consumers lose faith in the market for anti-malware products. In this latest ebook from SC Magazine, Managing Editor Greg Masters looks at how rogue AV spreads, what law enforcement can do, what the security vendors are doing, and what effect the spread is having on the marketplace.
close

Next Article in Research

Advertisement

How to Prevent Insider Threats!

POLL

More in Research

2013 eBook on surviving SIEM

2013 eBook on surviving SIEM

Protecting mission-critical systems against cyber attacks has become a national priority for government, critical infrastructure and military sites, and a business priority for corporations.

2013 eBook on cyber espionage

2013 eBook on cyber espionage

Nation-states can now skip over costly and time-consuming R&D by stealing corporate and government data and turning that information into a competitive advantage.

2013 eBook on Advanced Persistent Threats

2013 eBook on Advanced Persistent Threats

APTs - most often taking the form of cyber criminal campaigns out for financial gain or trade secrets - have impacted some of the largest organizations and government agencies in ...