Pony is a stealer Trojan and has been active for quite a while now. It was responsible for stealing over $200,000 in bitcoins ( https://thr...
Home
Archive for
December 2015
Pony Trojan reversing (part-I)
Pony is a stealer Trojan and has been active for quite a while now. It was responsible for stealing over $200,000 in bitcoins ( https://thr...
Internet Explorer remote memory-corruption vulnerability CVE-2015-2444
Vulnerability : As per the Symantec report, Microsoft Internet Explorer is prone to a remote memory-corruption vulnerabilit...
Deep Packet Inspection in Cloud Applications
Cloud-Based Applications and Protocols In the previous article, we established that security in cloud-based applications is important ...
Subscribe to:
Posts
(
Atom
)