SymcSecurityResponse asked:

This video describes the inner workings of the toolset used to create Backdoor.Ghostnet and control compromised computers. Further information is available on the Security Response Blog: forums2.symantec.com

Advertisement
Tagged with →  
Share →

Leave a Reply

Your email address will not be published. Required fields are marked *

* Copy This Password *

* Type Or Paste Password Here *

Looking for something?

Use the form below to search the site:


Still not finding what you're looking for? Drop us a note so we can take care of it!

Set your Twitter account name in your settings to use the TwitterBar Section.