Click a link below to view the mailing archive as if it had been sent to you. . 2014-11-27 01:30 G Data SecurityBlog (english) - Regin, an old but sophisticated cyber espionage toolkit platform - Malware can be named in one breath with Stuxnet & Co. ...
‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
Your email updates, powered by FeedBlitz

G Data SecurityBlog (english) Archive for November, 2014

Click a link below to view the mailing archive as if it had been sent to you.

2014-11-27 01:30G Data SecurityBlog (english) - Regin, an old but sophisticated cyber espionage toolkit platform - Malware can be named in one breath with Stuxnet & Co.
2014-11-25 01:30G Data SecurityBlog (english) - UPDATE: The tool „Detekt“: what you should know about it - A series of false positive detections unsettles users!
2014-11-22 01:30G Data SecurityBlog (english) - The tool „Detekt“: what you should know about it - Why you should not rely on this tool alone
2014-11-20 01:30G Data SecurityBlog (english) - IT Security, Foosball and Charity: VB 2014 had it all - G DATA delegation attends the 24th Virus Bulletin International Conference in Seattle, USA
2014-11-12 01:30G Data SecurityBlog (english) - The Uroburos case: new sophisticated RAT identified - Agent.BTZ's successor, ComRAT, shows that the campaign is still active
2014-11-05 01:30G Data SecurityBlog (english) - EU research group names G DATA most innovative company - German virus protection pioneer wins the IPACSO cyber security award
2014-11-01 01:30G Data SecurityBlog (english) - Operation "TooHash": how targeted attacks work - Data stealing campaign with two RATs identified

 

<< Archive IndexSubscribe >>