What is a proxy and what types of proxies exist? What protocol are used in the anonymization process? How does anonymity help with malware investigations?
Ignacio PérezSecurity Researcher
Articles by author
As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.Ignacio Pérez