Stay in touch with us: Facebook | Twitter | LinkedIn | Newsletter
ImmuniWeb® by High-Tech Bridge


High-Tech Bridge Newsletter

Subscribe to our newsletter and receive some or all of our corporate news, invitations to security events or HTB Security Advisories – you choose what you want to receive.

Client-side threats - Anatomy of Reverse Trojan attacks

Thursday, December 2, 2010 By

Author: Frédéric BOURLA, Head of Ethical Hacking Department at High-Tech Bridge SA


Client-side vulnerabilities are among the biggest threats facing users. Attackers are going after weaknesses in desktop applications such as browsers, media players, common office applications and e-mail clients to install malicious software, often Trojan horses and rootkits. This document explains in detail these threats while how to prevent them.


Tags: Trojan
User Comments and Opinions