Get a Pentest and security assessment of your IT network.

Cyber Security

Inside The Aurora (Google Attack) Malware

Security researchers are continuing to delve into the details of the malware that s been used in the attacks against Google, Adobe and other large companies. The attacks, which are being called Aurora, were expressly designed to retrieve valuable files from compromised machines. In a blog post describing a detailed analysis of the applications, Guilherme Venere of McAfee says that there are a number of interrelated pieces of malware, each of which served a specific purpose. This way the attackers were able to covertly gather all the information they wanted without being discovered.

Source: https://threatpost.com/inside-aurora-google-attack-malware-011910/73395/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security