Learn about the five security myths about mobile devices in the business place. Do not fall into the trap. Source: Panda
Learn about the five security myths about mobile devices in the business place. Do not fall into the trap. Source: Panda
While we were researching the malicious program Lurk in early February 2016, we discovered an interesting oddity in how this banking Trojan spreads. From the data we had, it emerged that the users attacked by Lurk also installed the remote administration software Ammyy Admin on their computers. At first, we didn’t really give this much […]