Blogs

“How to Stop Malware” – Strategies and Tools of Cyber Criminals

08.26.14

Dell’sAnatomy of a cyber-attack” focuses on malware because malware “comes in various forms, some more nefarious than others, ranging from annoying sales pitches to potentially business-devastating assaults.” This “how to” report from Dell makes the point that you “need to understand the enemy before you can defeat them” and includes these Attack Steps:

Attack step 1: Reconnaissance and enumerationCyber-criminals will do anything to find and exploit your weaknesses

Attack step 2: Intrusion and advanced attacks - A stealthy intruder can access every facet of your network systems.

Attack step 3: Malware insertionHidden malware gives your attacker the keys to your network.

Malware type 1: Nuisance malwareNuisance adware can render a system inoperable if not removed properly.

Malware type 2: Controlling malwareHidden malware gives your attacker the keys to your network.

Malware type 3: Destructive malwareViruses and worms can devastate your network—and your business.

Attack step 4: Clean-up – A skilled criminal can compromise your network without you ever knowing.

Cybercrime is daily front page news and although there is not one solution, Dell’s point is that it has a technology to help called Dell™ SonicWALL™ which “offers a comprehensive line of defenses against all forms of cyber attack and malware.”

The publications contained in this site do not constitute legal advice. Legal advice can only be given with knowledge of the client's specific facts. By putting these publications on our website we do not intend to create a lawyer-client relationship with the user. Materials may not reflect the most current legal developments, verdicts or settlements. This information should in no way be taken as an indication of future results.

Search Tips:

You may use the wildcard symbol (*) as a root expander.  A search for "anti*" will find not only "anti", but also "anti-trust", "antique", etc.

Entering two terms together in a search field will behave as though an "OR" is being used.  For example, entering "Antique Motorcars" as a Client Name search will find results with either word in the Client Name.

Operators

AND and OR may be used in a search.  Note: they must be capitalized, e.g., "Project AND Finance." 

The + and - sign operators may be used.  The + sign indicates that the term immediately following is required, while the - sign indicates to omit results that contain that term. E.g., "+real -estate" says results must have "real" but not "estate".

To perform an exact phrase search, surround your search phrase with quotation marks.  For example, "Project Finance".

Searches are not case sensitive.

back to top