Banking Malware

By   ISBuzz Team
Writer , Information Security Buzz | Nov 20, 2017 09:15 am PST

Manoj Asnani, VP Product and Design at Balbix:

“Terdot uses two attack vectors to exploit users – phishing and Man-in-the-middle. Enterprises that have deployed breach prediction systems that comprehensively cover all attack vectors are able to defend against Terdot more effectively. But, it should be noted that most of today’s detection solutions are single attack vector focused. A multi-vector system is needed in this case – and would have proactively flagged users that are at risk of phishing, in addition to compromised or spoofed certificates.”

Notify of
0 Expert Comments
Inline Feedbacks
View all comments

Recent Posts

Would love your thoughts, please comment.x