NetSec
  corner   



HOME

LINUX

CYBERLAW

VIRTUALIZATION

Bugtraq

Packetstorm

FD

GrokLaw


RSS Feed


Netsec, comsec, infosec and IA news, research and trends

 

8.28.2014

 
Group finds way to decrypt files after Cryptolocker Ransomeware



8.26.2014

 
Duping the machine - the cunning malware that throws off researchers:  "The trouble with analysing malware in a sandbox environment is when the malware is cunning enough to realise, and then employs a variety of techniques to throw off researchers."





This page is powered by Blogger.


Site Meter Locations of visitors to this page