
Sign up to save your podcasts
Or
MIMICKING FILE NAMES
These Trojan horse naming issues go far beyond just putting spaces between the name and its file extension on Windows systems. Often, to fool a victim, attackers create another file and process with exactly the same name as an existing program installed on the machine e.g. “iexplore”, a Windows process.
Featuring "keycybr" CI&R Intern "Kumar Atul Jaiswal".
Get in touch with him - https://www.linkedin.com/in/whoiskumaratul/
MIMICKING FILE NAMES
These Trojan horse naming issues go far beyond just putting spaces between the name and its file extension on Windows systems. Often, to fool a victim, attackers create another file and process with exactly the same name as an existing program installed on the machine e.g. “iexplore”, a Windows process.
Featuring "keycybr" CI&R Intern "Kumar Atul Jaiswal".
Get in touch with him - https://www.linkedin.com/in/whoiskumaratul/