Kaspersky uncovers trojan spread by “spear-phish” to Tibet activists.
Category: APT
Attackers use all kinds of attack vectors to steal sensitive information from their targets. Their efforts are not limited to only zero-day vulnerabilities. Malware authors often exploit old vulner
How do companies prepare for the worst? By exposing workers to lifelike crises.
Hackers had run of network, stole and cracked all employee passwords.