- Security
- By Lucian Constantin
- May 5th, 2009
Researchers Peak Inside the Torpig Trojan Infrastructure
Hijacking and monitoring the botnet for ten days outlines interesting aspects
- Spyware Threats
- By Lucian Constantin
- April 16th, 2009
Revamped MBR Rootkit Impresses Security Researchers
New Mebroot variant employs sophisticated in-depth techniques to avoid detection