Linux Security Reviews 2015 a PDF document about 75 pages long.

by:  AV-Comparatives:    www.av-comparatives.org

>From the introduction:  ... for example, in March 2014, ZDNet 1
reported the discovery of the cybercrime campaign “Operation Windigo”. One
of Windigo’s components – Ebury – provided attackers with a backdoor to
infected servers and the ability to steal SSH credentials and send spam
mails. Researchers observed that Ebury had infected approximately 26,000
Linux servers since May 2013.

A well written, informative and organized document.  Take a look.
    Tabo

-- 
-- 
You received this message because you are subscribed to the Google Groups 
"NLUG" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/nlug-talk?hl=en

--- 
You received this message because you are subscribed to the Google Groups 
"NLUG" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to