分享到:
http://www.securityweek.com/oceanlotus-trojan-os-x-evades-antiviruses
http://blog.fortinet.com/post/a-closer-look-at-locky-ransomware-2
http://www.lauradhamilton.com/machine-learning-algorithm-cheat-sheet
http://daringfireball.net/linked/2016/02/17/ios-security-guide
http://frequentlyinaccurate.net/2016/02/vulnhub-pipe-walkthrough/
http://joshuadlewis.blogspot.de/2014/10/advanced-threat-detection-with-sysmon_74.html
https://www.nccgroup.trust/uk/our-research/building-wimap-the-wi-fi-mapping-drone/
https://blogs.mcafee.com/mcafee-labs/clever-phishing-attacks-target-google-yahoo-dhl-customers/
http://blog.ioactive.com/2016/02/remotely-disabling-wireless-burglar.html
http://blog.k3170makan.com/2016/02/stealing-secrets-with-css-cross-origin.html
本文由 360安全播报 翻译,转载请注明“转自360安全播报”,并附上链接。
原文链接: