Most families of malware operate on a common assumption: a user’s data is valuable. For instance, some malware samples transmit pieces of a victim’s data to their command-and-control (C&C) server as means of setting up an attack, while others fully embrace the spyware classification and collect as much information about a user as possible. At […]… Read More
The post Shamoon 2: Nothing Whets Disttrack’s Appetite Like Destroyed Data appeared first on The State of Security.
from The State of Security http://ift.tt/2gSfTWM
via https://ifttt.com/ IFTTT
No comments:
Post a Comment