Blog Posts Tagged with "TDSS"
February 24, 2012 Added by:Eric Cissorsky
The deadline should be treated as an opportunity for your organization to learn and refine their processes and procedures. Like any other virus outbreak, this requires a coordinated effort between security professionals, systems administrators and other stakeholders...
June 30, 2011 Added by:Headlines
“The development of TDSS will continue. Active reworkings of TDL-4 code, rootkits for 64-bit systems, the use of P2P technologies, proprietary anti-virus and much more make the TDSS malicious program one of the most technologically developed and most difficult to analyze..."
FCC Seeks Public Comment on Mobile Data Coll... taylor white on 07-24-2014
Mobile Security: Tips for Using Personal Dev... taylor white on 07-24-2014
Nortel: From Bankruptcy to Industrial Espion... Eddie colin on 07-23-2014