Detonation Report: The Art of Deception

Friday 16 March

Since the Greek army concealed itself within a wooden horse to enter the city of Troy, attackers have sought to hide their malicious intent from their victims. 

Back in the 1980’s, when the term ‘virus’ was first used to describe computer malware, relatively few types of malware existed. The small number of anti-virus vendors at the time only had to detect, by today’s standards, a relatively small number of ‘signatures’, the unique pattern of code which identified a particular strain of computer malware. 

With the Internet still a twinkle in the eye of Tim Berners-Lee and computer networks not deployed in the vast majority of organisations the malware writers preferred malware delivery method would have been via floppy disk...

To read the full report and to stay up-to-date with future alerts join our LinkedIn Group:

Cyber Threat Intelligence Watch Group:

If you would prefer not to click on the link then simply search for our “Cyber Threat Intelligence Watch” Group in LinkedIn.

If you would prefer a copy of the whole report to be emailed to you directly then please send an email to [email protected].

We are currently recruiting for Appointment Maker, Internal Sales Team Leader, IT Sales Apprentice Find out more >