Choosing modern anti-malware, a search engine, browser and its extensions for security and privacy
Month: June 2016
When the CDN Goes Bananas
Slides on Subresource Integrity from the SecTalks Sydney meetup
Command-and-Control Malware Traffic Playbook
Malicious actors operate command-and-control (C&C/C2) servers to interact with their victims’ computers. These C2 servers are intended to instruct the compromised PCs to do undesired things, such as stealing the user’s passwords, encrypting the files for ransom or attacking other computers on the network.