News, views, and insight from the ESET security community
By Rob Waugh posted 4 Mar 2013 - 07:15AM
Technical and in-depth analysis of the implementation of hidden encrypted storage, as used by complex threats currently in the wild including TDL4, Carberp and ZeroAccess. First published in Virus Bulletin 2012 Conference Proceedings*
Comments are closed.
Sign up to our newsletter
The latest security news direct to your inbox
Add this code to your site