- "Analysis of a malware sample matching the MD5 hash signature of the 'Destover' malware that was used in the attack on Sony Pictures by researchers at Cisco revealed that the code was full of bugs, and anything but sophisticated. It was the software equivalent of a crude pipe bomb." http://arstechnica.com/security/2014/12/state-sponsored-or-not-sony-pictures-malware-bomb-used-slapdash-code/ 43 comments technology
Linking pages
- A Hacker's Hit List of American Infrastructure - The Atlantic http://www.theatlantic.com/technology/archive/2015/01/a-hackers-hit-list-of-american-infrastructure/384166/ 271 comments
- North Korean defector to airdrop DVD, USB copies of The Interview | Ars Technica http://arstechnica.com/tech-policy/2014/12/north-korean-defector-to-airdrop-dvd-usb-copies-of-the-interview/ 3 comments
- A Hacker's Hit List of American Infrastructure - The Atlantic http://m.theatlantic.com/technology/archive/2015/01/a-hackers-hit-list-of-american-infrastructure/384166/?single_page=true 0 comments
Linked pages
- Wiper Malware - A Detection Deep Dive - Cisco Blogs http://blogs.cisco.com/security/talos/wiper-malware 3 comments
- North Korean defector to airdrop DVD, USB copies of The Interview | Ars Technica http://arstechnica.com/tech-policy/2014/12/north-korean-defector-to-airdrop-dvd-usb-copies-of-the-interview/ 3 comments
- After hackers’ terror threats, Sony says it plans to release The Interview on a “different platform” [Updated] | Ars Technica http://arstechnica.com/tech-policy/2014/12/sony-hackers-terror-threat-prompts-movie-chain-to-pass-on-the-interview 0 comments
Related searches:
Search whole site: site:arstechnica.com
Search title: State-sponsored or not, Sony Pictures malware “bomb” used slapdash code | Ars Technica
See how to search.