Trojan uses a key internet feature to receive marching orders

If malware uses a remote command-and-control server to function, it's relatively easy to cripple it by blocking the internet addresses it uses. It's not always that easy, however, and researchers at Cisco's Talos group have found a textbook example…

Leave a Reply

Read the original at Engadget RSS Feed.