Forget the popular myth of the teen hacker. An older, more sophisticated hacker is out there, spreading malicious code disguised as files and standard Internet apps into corporate networks. IT managers can take every precaution-blocking inappropriate and suspicious websites, rejecting Visual . . .
Forget the popular myth of the teen hacker. An older, more sophisticated hacker is out there, spreading malicious code disguised as files and standard Internet apps into corporate networks. IT managers can take every precaution-blocking inappropriate and suspicious websites, rejecting Visual Basic scripts or other Internet code and scanning each e-mail attachment for viruses, but that won't stop hackers from sneaking unknown viruses and sophisticated code past a company's antivirus and content-filtering gateways.

Today's popular content-security technology ferrets out only known viruses or specified content.

It's this fear of the unknown that's starting to scare some IT managers into adding behavior-blocking, or "sandboxing," technology, as a last line of defense at the desktop.

The link for this article located at Planet IT is no longer available.