Computer hackers are increasingly tailoring attacks using Trojan horse programs for certain businesses in hopes of filching intellectual property, a new security report released Thursday said.
Multiple hacker groups are using a “construction kit” supplied by the author of a Trojan horse program discovered last October to develop and unleash more dangerous variants of the original malware.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results