Linux Security Reviews 2015 a PDF document about 75 pages long.
by: AV-Comparatives: www.av-comparatives.org
>From the introduction: ... for example, in March 2014, ZDNet 1
reported the discovery of the cybercrime campaign “Operation Windigo”. One
of Windigo’s components – Ebury – provided attackers with a backdoor to
infected servers and the ability to steal SSH credentials and send spam
mails. Researchers observed that Ebury had infected approximately 26,000
Linux servers since May 2013.
A well written, informative and organized document. Take a look.
Tabo
--
--
You received this message because you are subscribed to the Google Groups
"NLUG" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/nlug-talk?hl=en
---
You received this message because you are subscribed to the Google Groups
"NLUG" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.