Here is an interesting persistence technique, which I have not seen before, used by a malware which I analyzed last […]

Dhanalakshmi
June 16, 2016
Here is an interesting persistence technique, which I have not seen before, used by a malware which I analyzed last […]
Here at K7 Computing we believe it is extremely important to further the education of both those within as well […]
The CARO Workshop 2016, held in Bucharest, Romania, between May 19-20 featured presentations from notable security vendors and researchers, with […]
This blog intends to educate the general public about the security risks pertaining to pen drives (aka USB sticks/drives, thumb/removable […]
Yet another reminder of the importance of implementing robust website security, the flash news today alleged that “IRCTC website has […]