In the new cryptomining module we discovered and described in our previous article, the cybercriminals behind the Stantinko botnet introduced several obfuscation techniques, some of which have not yet ...
This responds to “Turnpike strives for transparency,” an opinion piece by Mark Compton published April 27 in the Observer-Reporter. Mr. Compton’s piece is a classic example of Pennsylvania Turnpike ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
I am the founder and CEO of Apriorit, a software development company that provides engineering services globally to tech companies. Nowadays, cyber attackers are armed with an impressive range of ...
FinFisher/FinSpy, the infamous and highly controversial commercial spyware sold by German firm FinFisher to nation-states and law enforcement for surveillance purposes, now wraps itself in four layers ...
The ease at which criminals can reverse engineer software makes for lucrative transgressions with national security implications, prompting government-backed researchers to seek innovations to shore ...
ESET researchers recently described Wslink, a unique and previously undocumented malicious loader that runs as a server and that features a virtual-machine-based obfuscator. There are no code, ...
VPNs continue to be used extensively as tools to protect data security and user privacy. Yet, as to be expected, there are many providers available, and many options within those providers – so buyer ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results