Top exploits of 2011 presented at Virus Bulletin 2011

by Holly Stewart (Microsoft),

Tags: Security


Summary : At the end of 2010, a marked rise in the exploitation of Java vulnerabilities took place. As users adopt more secure
computing practices, attackers must move on to easier targets. What are the changes in exploitation techniques for 2011?
Using the Microsoft Malware Protection Center (MMPC) global attack data collected from tens of millions of computers in
over 200 country/regions, this talk will discuss the most prevalent exploit techniques in use today and new techniques
that are on the rise, including variances between geographies, consumer users, and corporate users.