0

A Quick Tor Primer

So Tor can be used by malware authors to hide, command, and control traffic. It’s not that common, but it is becoming more popular as a …

0

Malware Command and Control

One thing almost all malware has in common (especially more advanced varieties) is robust command and control infrastructure. Ironically, …