vulnerabilities

190 articles

TeslaCrypt: Round Three

Malware development and our attempts to fight it sometimes remind us of a deep TV series: one can trace how “characters” acquire new skills, overcome hardships and make new achievements.