understanding

Understanding X-morphic exploitation

Understanding X-morphic exploitation

The concept of malware morphing is not new. For years, malware authors and anti-virus researchers have documented and classified the methods used to obfuscate and hide malware code with each infection.
Gunter Ollmann, May 8 2007 11:13AM Security
Understanding common wireless LAN attacks

Understanding common wireless LAN attacks

There is little doubt the enterprise Wireless LAN (WLAN) market is booming. Worldwide WLAN hardware revenue is expected to top $3.7bn USD in 2007 (Infonetics), with over 50% of enterprises deploying WLANs by 2006 (Meta Group).
Brian Mansfield Dec 1 2004 10:38AM Security

Log In

  |  Forgot your password?