Source: http://www.ectnews.com/story/79959.html
Author: Richard Adhikari
“After reading the paper, [I believe] it is indeed the most complex piece of malware ever discovered,” Sorin Mustaca, an IT security expert at Avira, told TechNewsWorld.
Cybersecurity, Automotive Security, Antimalware Software, Product Management, Agile, AI, Secure Software Development, SSDLC
Source: http://www.ectnews.com/story/79959.html
Author: Richard Adhikari
“After reading the paper, [I believe] it is indeed the most complex piece of malware ever discovered,” Sorin Mustaca, an IT security expert at Avira, told TechNewsWorld.
Originally published here: http://grahamcluley.com/2013/12/three-key-security-threats/ 1. Security breaches and hacks 2013 was the year that major security breaches and hacks really took hold. Millions of credentials were stolen from the likes of Twitter, Tumblr,Yahoo, Adobe and many others. Whenever data breaches like this occur, targeted attacks against the users of such wesbites can quickly follow. The targeted attacks usually consist […]
Remember this post: http://sorin-mustaca.com/2013/07/03/about-the-internet-threat-landscape-and-why-small-businesses-are-the-most-vulnerable/ ? I almost forgot about it… Until today. I received the PDF version of the final article: FocusM-MY “SMEs are generally easier to attack than larger corporations”, says Mustaca I’ve been quoted quite a lot of times…
Cinco pistas para descubrir que han ‘hackeado’ tu ‘smartphone’ Click here for the Google Translation. Sorin Mustaca, experto en seguridad IT de Avira, ha explicado a Teknautasque “el malware normalmente envía información a los cibercriminales, lo que implica un aumento en el uso de datos. Si su proveedor le ha rebajado la velocidad de transmisión es porque está […]
You must be logged in to post a comment.