Abstract
Much has been made in recent months of so-called Advanced Evasion Techniques (AETs) that could be used by hackers and cyber-criminals to bypass IT security defences. Do the claims stand up to technical scrutiny? Steve Gold investigates and discovers that AETs may not be as new as some experts claim.