The Latest in IT Security

The Equation Group’s Sophisticated Hacking and Exploitation Tools

18
Feb
2015
The Equation Group’s Sophisticated Hacking and Exploitation Tools

bth_b007b5a7605682d4759b8960f24e291a

This week, Labs published detailed information on what it calls the Equation Group — almost certainly the — and its abilities to embed deep inside computers, gaining pretty much total control of those computers while maintaining persistence in the face of reboots, operating system reinstalls, and commercial anti-virus products.

The details are impressive, and I urge anyone interested to read the Kaspersky documents, or this very detailed article from Ars Technica.

Read More

Leave a reply


Categories

TUESDAY, OCTOBER 23, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks