Monday, 5 December 2016

Shamoon 2: Nothing Whets Disttrack’s Appetite Like Destroyed Data

Most families of malware operate on a common assumption: a user’s data is valuable. For instance, some malware samples transmit pieces of a victim’s data to their command-and-control (C&C) server as means of setting up an attack, while others fully embrace the spyware classification and collect as much information about a user as possible. At […]… Read More

The post Shamoon 2: Nothing Whets Disttrack’s Appetite Like Destroyed Data appeared first on The State of Security.



from The State of Security http://ift.tt/2gSfTWM
via https://ifttt.com/ IFTTT

No comments:

Post a Comment