Cookies enable us to provide the best experience possible and help us understand
how visitors use our website.
Scroll down for all the latest news and information covering IT forensics.
Subscribe to our FREE weekly newsletter for all the latest industry news…
But new details of the hack emerge, as regulators consider vendor regulations.
The new toolkit leverages internet of things (IoT) devices and a host of traffic techniques to launch massive attacks.
New capabilities are expanding the malware's target area and threat level.
Security visionary Dan Geer laid out recommendations and observations for the information security industry in his keynote speech for the Black Hat security conference on Wednesday.
The Android version of the malware has been sent "uninstall" messages.
The malware uses the Tor anonymity network to attack its victims.