http://www.infosecurity-magazine.com/rss/news/76/application-security/
The malware can cloak a malicious payload that could be remotely controlled by an adversary
Read the original article:
http://www.infosecurity-magazine.com/rss/news/76/application-security/
The malware can cloak a malicious payload that could be remotely controlled by an adversary
Read the original article: