Get a Pentest and security assessment of your IT network.

Cyber Security

Inside The Aurora (Google Attack) Malware

Security researchers are continuing to delve into the details of the malware that s been used in the attacks against Google, Adobe and other large companies. The attacks, which are being called Aurora, were expressly designed to retrieve valuable files from compromised machines. In a blog post describing a detailed analysis of the applications, Guilherme Venere of McAfee says that there are a number of interrelated pieces of malware, each of which served a specific purpose. This way the attackers were able to covertly gather all the information they wanted without being discovered.

Source: https://threatpost.com/inside-aurora-google-attack-malware-011910/73395/

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation