New documents from Microsoft

  • Thread starter Bill Sanderson MVP
  • Start date
B

Bill Sanderson MVP

http://www.microsoft.com/downloads/...d4-0e65-4133-85e7-44e666cc245a&displaylang=en

We will explore the technical methods employed by both hardware and
software-based key loggers, how keystroke loggers are integrated with
specific malware threats, the user experience associated with various
key loggers installed, and examine the social and legal appropriateness
of various use scenarios.

http://www.microsoft.com/downloads/...60-58da-40db-8785-689cf6a05c73&displaylang=en

This paper will provide examples of poignant social engineering
‘exploits’ over the past few years and attempt to construct a model,
using telemetry from Microsoft’s Windows Malicious Software Removal
Tool, that can predict the prevalence of a specific social engineering
threat based on its characteristics and appeal to the user.


--
 
P

plun

Thanks Bill !

The next challenge for MS is howto make such studys to
something a majority of users reads.... ;)

The codecs thread in DSLreports is still alive and this is
a great
example how to make users more "educated" about this "junkyard"
with "social engineering" tricks.

http://www.dslreports.com/forum/remark,17163035

regards
plun


Bill Sanderson MVP skrev:
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top