With the growing clout of the social networking and Web 2.0, the threats that can afflict a PC connected to the Internet have also grown manifold. From malicious trojans to poisoned searches, the cyber criminal of today is already working on ways to how to con people using the latest that technology has to offer. Is there a way to safeguard against these attacks.
This report touches upon this subject and lists of ways and means in which the PC can be attacked. Not only that, the Trend Micro report also provides ways and means to guard against these threats. A must for any network administrator.
Add new comment