Trojan

Elude control … let’s digitally sign malware code

F-Secure Researchers have discovered a digitally signed malware that has code signed with a stolen government certificate belonging to the…

12 years ago

Duqu … Do we really know the enemy?

In recent months we have read many reports related the analysis of the famous malware  and different assumptions about its genesis. Who designed the malicious agent? For what purpose? What features of Duqu…

12 years ago

Video game & Security, a new opportunity? Gaming platform primary target for cyber attacks. (EN/IT)

English version Which could be a critical objective to choose if we evaluate media coverage of the event, complexity and effort…

12 years ago

New variants of the DevilRobber Mac OS X TrojanFound in Trojaned Apps Are Stealing Data

Mac malware has been making some headlines in the last few months, as attackers have begun applying to OS X…

12 years ago

This website uses cookies.