Windows processes can be exploited to circumvent traditional security products, say researchers at Black Hat Europe.

Leave a Reply