We all like looking for bad guys, and sometimes the easiest villain to see is the one out in front. But when it comes to malware, the most cunning come from elsewhere
Kellermann analyzes the patterns of malware from the two geographies and concludes East European hackers lean towards custom-built, highly complex malware; East Asian hackers use more off-the-shelf malware and simpler techniques.
It’s an insightful argument and the original paper should be read by IT security staff. However, the bottom line is no matter where malware comes from, be prepared.Related Download
Sponsor: IBM Canada Ltd
The New Workplace: Supporting “Bring your own”
“Bring Your Own Device” (BYOD) and the “consumerization of IT” have taken hold in the enterprise, and employees using their own personal smartphones and tablets for business have become pervasive.