Stealthy Evolution: Hackers develop new malware command-and-control methods/ Rodrigo Bijou
Material type: TextPublication details: 2017Subject(s): In: Jane's Intelligence Review Vol.29, Issue 8, August 2017, pp.50-53 (123)Summary: Under the pressure from law enforcement agencies and security researchers, hackers are experimenting with increasingly novel command-and-control structures for malware. The author assesses some of the techniques that have been uncovered and examines the implications for the authorities.Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Journal Article | Mindef Library & Info Centre Journals | MISCELLANEOUS (Browse shelf(Opens below)) | 1 | Not for loan | 59657.1001 |
Under the pressure from law enforcement agencies and security researchers, hackers are experimenting with increasingly novel command-and-control structures for malware. The author assesses some of the techniques that have been uncovered and examines the implications for the authorities.
There are no comments on this title.
Log in to your account to post a comment.