By Editor posted 4 Mar 2013 at 07:15AM
Technical and in-depth analysis of the implementation of hidden encrypted storage, as used by complex threats currently in the wild including TDL4, Carberp and ZeroAccess. First published in Virus Bulletin 2012 Conference Proceedings*
Comments are closed.
Automatically receive new posts via email:
Delivered by FeedBurner