Hackers move to create next Blackhole after 'Paunch' arrest
08.10.2013
Unlike most exploits, Blackhole includes built-in code obfuscation techniques and other evasive measures that make it hard to copy. Blackhole is constantly evolving and is therefore harder to detect and block.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on TwitterTwitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His email address is jvijayan@computerworld.com. Alles zu Twitter auf CIO.de
Read more about cybercrime and hacking in Computerworld's Cybercrime and Hacking Topic Center.
Jaikumar Vijayan