Top IT Security Bloggers

Anatomy of an exploit - inside the CVE-2013-3893 Internet Explorer zero-day - Part 2

Part Two of our examination of an IE exploit.

This is a great read if you want to get a feeling for how cybercrooks think. (Don't worry if you aren't technical: it's clear and jargon-free.)

Read the full article