Microsoft and Thales e-Security have deployed an architecture for encrypted cloud storage where you, the customer, control the keys and the provider has none.
Microsoft and Thales e-Security have deployed an architecture for encrypted cloud storage where you, the customer, control the keys and the provider has none.
Advances in spam detection meant that spam operators had to find ways to circumvent new technologies. For instance, Asprox made significant improvements in their spam and module architecture whereas Pushdo made use of decoy network traffic.Recently, we have discovered a new simple method used by a spam botnet we named StealRat. It consists of 3 […]
Shortly after 10:00am Jun 25th 2013, many government websites from South Korea were not accessible. It was actually caused by the malware performing ddos attack on 2 major DNS servers (ns.gcc.go.kr and ns2.gcc.go.kr).Original Attack VectorDuring the investigation, we managed to find the original attack sample which was served by a compromised website at that time […]
Latest Comments