Top exploits of 2011

Holly Stewart Microsoft

  download slides (PDF)

At the end of 2010, a marked rise in the exploitation of Java vulnerabilities took place. As users adopt more secure computing practices, attackers must move on to easier targets. What are the changes in exploitation techniques for 2011? Using the Microsoft Malware Protection Center (MMPC) global attack data collected from tens of millions of computers in over 200 country/regions, this talk will discuss the most prevalent exploit techniques in use today and new techniques that are on the rise, including variances between geographies, consumer users, and corporate users.