In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at the kernel level to bypass Microsoft’s security for 64-bit Windows systems. Toda
Month: July 2014
Phishing attack let Unit 61398 spend 4 months installing trojans and keyloggers.
Bug “known for years” exposes mobile users’ accounts to hostile takeover.
“Fake ID” exploits work because Android doesn’t properly inspect certificates.