Researchers Peak Inside the Torpig Trojan Infrastructure

Researchers Peak Inside the Torpig Trojan Infrastructure

Hijacking and monitoring the botnet for ten days outlines interesting aspects

Revamped MBR Rootkit Impresses Security Researchers

Revamped MBR Rootkit Impresses Security Researchers

New Mebroot variant employs sophisticated in-depth techniques to avoid detection