The attack has been carried out using legitimate services and standard software functions, CERT-UA observed
This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/
Read the original article:
The attack has been carried out using legitimate services and standard software functions, CERT-UA observed
Read the original article: