This blog was co-authored by Kevin Brooks, Alex Chiu, Joel Esler, Martin Lee, Emmanuel Tacheau,
Malware can find its way into the most unexpected of places.
Phishing attacks use social engineering in an attempt to lure victims
This post has been coauthored by Joel Esler, Craig Williams, Richard Harman, Jaeson Schultz, and
Craig Williams and Jaeson Schultz have contributed to this post.
We blogged in September of 2013 about variants of Havex. A month ago
This post was co-authored by Jaeson Schultz, Joel Esler, and Richard Harman.
Update 7-8-14: Part 2 can be