Stay in touch

Get our research, blog and event invitations before everybody else!


Your data will stay confidential Private and Confidential

Client-side threats - Anatomy of Reverse Trojan attacks

Thursday, December 2, 2010 By

Client-side vulnerabilities are among the biggest threats facing users. Attackers are going after weaknesses in desktop applications such as browsers, media players, common office applications and e-mail clients to install malicious software, often Trojan horses and rootkits. This document explains in detail these threats while how to prevent them.


Author: Frédéric BOURLA, Head of Ethical Hacking Department at High-Tech Bridge SA


Client-side vulnerabilities are among the biggest threats facing users. Attackers are going after weaknesses in desktop applications such as browsers, media players, common office applications and e-mail clients to install malicious software, often Trojan horses and rootkits. This document explains in detail these threats while how to prevent them.


Tags: Trojan

User Comments
Add Comment

High-Tech Bridge on Facebook High-Tech Bridge on Twitter High-Tech Bridge on LinkedIn High-Tech Bridge RSS Feeds Send by Email
Share