DZone
Security Zone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
  • Refcardz
  • Trend Reports
  • Webinars
  • Zones
  • |
    • Agile
    • AI
    • Big Data
    • Cloud
    • Database
    • DevOps
    • Integration
    • IoT
    • Java
    • Microservices
    • Open Source
    • Performance
    • Security
    • Web Dev
DZone > Security Zone > The Malware Maze [Video]

The Malware Maze [Video]

Security experts break down how malware works, and how hackers tend to attempt to deliver malware to their victims' systems.

Chantelle Patel user avatar by
Chantelle Patel
·
Jul. 09, 17 · Security Zone · Analysis
Like (2)
Save
Tweet
2.65K Views

Join the DZone community and get the full member experience.

Join For Free

Cyberattacks on sensitive data have made far too many headlines in the recent weeks. Each attack differs in execution, but one thing is often the same - malware is making its way into the network and it's spreading like wildfire.

With the increase of breaches occurring on a global scale, enterprises need to be prepared now more than ever for the chance of an attack. Some malware follows a distinct, methodical path of destruction.

For example, it starts with delivery through malicious emails or URL links. Once a link is clicked, the malware scans for vulnerabilities in the system and, once it finds one, installs through the security gaps. It can then communicate with its host and execute what it's designed to do - exfiltrate data.

To learn more check out our latest Glass Class video: 


Malware

Published at DZone with permission of Chantelle Patel, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Everything You Need to Know About Web Pentesting: A Complete Guide
  • Kubernetes Data Simplicity: Getting Started With K8ssandra
  • How Do You Know If a Graph Database Solves the Problem?
  • API Security Weekly: Issue 172

Comments

Security Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • MVB Program
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends:

DZone.com is powered by 

AnswerHub logo