HIT Consultant Insightful coverage of healthcare innovation
 

kernel mode components

Results 1 - 1 of 1Sort Results By: Published Date | Title | Company Name
Published By: ESET     Published Date: Sep 07, 2011
In this report, we investigate the implementation details of the malware and the ways in which it is distributed, and consider the cybercriminals' objectives.
Tags : 
eset, tdl, x64, cybercriminal, cybercrime, malware, security, rootkit
    
ESET
Search      

Add Research

Get your company's research in the hands of targeted business professionals.