Pony Trojan reversing (part-II) Unknown 14:56 Add Comment Edit Pony is a stealer Trojan and has been active for quite a while now. It was responsible for stealing over $200,000 in bitcoins ( https://thr...
Pony Trojan reversing (part-I) Unknown 14:46 Add Comment Edit Pony is a stealer Trojan and has been active for quite a while now. It was responsible for stealing over $200,000 in bitcoins ( https://thr...
Internet Explorer remote memory-corruption vulnerability CVE-2015-2444 Unknown 14:31 Add Comment Edit Vulnerability : As per the Symantec report, Microsoft Internet Explorer is prone to a remote memory-corruption vulnerabilit...
Deep Packet Inspection in Cloud Applications Unknown 14:21 Add Comment Edit Cloud-Based Applications and Protocols In the previous article, we established that security in cloud-based applications is important ...