Partagez vos passions
Rejoignez la communauté

  • Frank Gragham


    • a posté un article :

      Features of IoT devices security
          "Fingers" of honeypots Some families of malware use specific commands to calculate traps that are not fully emulated by honeypots. Attackers are constantly changing their fingerprint analysis methods to bypass virtual machine ...

    • a posté un article :

      IoT security
          "Residential" and "corporate" IP addresses Our telemetry data suggests that the most advanced botnet operators check the AS-name of the network and target primarily IP addresses belonging to ISPs that serve the private sector....

    Plus...

    Blogs de Frank Gragham

    Blogs favoris

    Frank Gragham n'a pas encore de blogs favoris

    Suit 0 membres

    Frank Gragham ne suit pas de membre

    Suivi par 0 membres

    Frank Gragham n'est suivi par aucun membre