It utilizes application controls that restrict usage of suspicious applications automatically and sets up a black list of apps that cannot be used.
FORBES: Russia's Kaspersky Lab Guns For Japan's Trend Micro
It contained a malware application, which had managed to bypass existing security controls, but was not able to spread through the computer system.
BBC: Australia's central bank targeted by hackers
应用推荐
模块上移
模块下移
不移动