Cost effective solutions for combating stealth attacks

Unmask stealthy villains

Published November 2013

The most menacing type of cyberattack is invisible. It may be a targeted attack that uses sophisticated stealth techniques, such as hiding outside the operating system (OS), or a banking Trojan that dynamically moves across endpoints and compromised servers globally.

In this paper McAfee discusses detecting the presence and actions of stealthy cyberattacks, and the best and most cost effective solution for combating them.