Get a Pentest and security assessment of your IT network.

News

Protecting the end-user

Mac-based computers have been host to all the normal types of malware for more than two decades. The first PC virus, Elk Cloner, was written for a Mac, then DOS became more popular, so the virus writers started writing for DOS. Windows has been the primary target of hackers ever since; Linux has its fair share of malware. The IM invasion (as I called it) was replaced with a p-to-p push, then music downloads (full of malware), and unauthorized USB keys.”]

Source: https://www.csoonline.com/article/2633135/protecting-the-end-user.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months