Remote Access Trojans: History, Dangers, and Defenses cover art

Remote Access Trojans: History, Dangers, and Defenses

Remote Access Trojans: History, Dangers, and Defenses

Listen for free

View show details

About this listen

These sources comprehensively examine Remote Access Trojans (RATs), defining them as malware granting attackers extensive control over compromised systems, often disguised as legitimate software. They trace the evolution of RATs from early remote administration tools like Carbon Copy to modern, financially motivated variants such as Dridex and Emotet, highlighting their increased sophistication and cross-platform capabilities. The texts also distinguish between Indicators of Compromise (IOCs), Behavior (IOBs), and Attack (IOAs), explaining how these are used to detect and prevent RAT infections. Furthermore, the sources provide practical prevention strategies like using anti-malware, implementing least privilege, and adopting zero-trust security models, while also discussing the legality of creating RATs for educational or research purposes, emphasizing that malicious use is the unlawful act.


What listeners say about Remote Access Trojans: History, Dangers, and Defenses

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.