Protect Your Critical Assets

Thursday Mar 4th 2010 by Staff

McAfee explains how the targeted Aurora attacks at Google and other companies worked and offers some possible counter-measures.

McAfee: In this white paper, researchers from McAfee detail the six-step process that allowed hackers to gain access to company servers in recent, well-publicized attacks. It lays much of the blame for the problem on software configuration management (SCM) systems that were not properly secured. It exposes the security flaws contained in some of the most popular SCMs and offers countermeasures for closing up the security holes.

Mobile Site | Full Site
Copyright 2017 © QuinStreet Inc. All Rights Reserved