Isolating and repairing a malware-infected computer system is just one step in a process that hopefully ends with identifying the source of the attack, but experts say getting to the culprit is more complicated than simply following a trail of breadcrumbs. According to a new report from FireEye, while many attacks are accompanied by regional signatures that point to a particular country or organization, strategic attribution involves considering a variety of factors, including the possibility of being intentionally misled.

Full Story:
Dark Reading

Related Summaries