
State-sponsored hacking attempts frequently rely on specially written software, but that's a risky move. Unless it's well-made, custom code can be a giveaway as to who's responsible. Attackers are switching things up, however. Security researchers at...
via Engadget RSS Feed http://www.engadget.com/2014/12/27/cyberattacks-used-security-software/?ncid=rss_truncated
0 comments:
Post a Comment