How does an infection look like from a user perspective
Posted in Business on Aug 26th, 2011
F-secure published an article today on how they found the mail and file used to hack RSA. A quite simple hack using social engineering and a standard Trojan named Poison Ivy using a zero day exploit, CVE-2011-0609. The article has an interesting video showing what happens from a user perspective when the computer becomes infected. […]