Loading...

The Prestige in Malware Persistence

Introduction Just like in magic tricks, a malware infection very often consists of three parts or acts. Paraphrasing the following narration from the film “The Prestige (2006)” gives an idea of what we [...]

By |2015-06-16T15:46:15+00:00June 16, 2015|

Verizon Data Breach Report 2015

A high level summary of the main findings from the cyber security industry’s favourite data driven report. As usual, the report is an easy read packed with analysis and information that is appetising [...]

By |2015-04-15T09:50:46+00:00April 15, 2015|
Load More Posts
Go to Top