Remove 12
Remove 2011 Remove Examples Remove Manufacturing Remove Strategy
article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

since at least 2011. For example, DroidDream. back in 2011. For example, recently NSA-leaked exploit. This difficult context, combined with the urgent need to help our users, led us to resort to a strategy that we rarely use: a coordinated takedown. Android malware. RageAgainstTheCage. Eternal Blue was weaponized.

article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

since at least 2011. For example, DroidDream. back in 2011. For example, recently NSA-leaked exploit. This difficult context, combined with the urgent need to help our users, led us to resort to a strategy that we rarely use: a coordinated takedown. Android malware. RageAgainstTheCage. Eternal Blue was weaponized.

article thumbnail

A Flurry of Recent Cybersecurity Activity from the Trump Administration

Data Matters

For example, in 2013, the Federal Bureau of Investigation (FBI) partnered with Microsoft to disrupt more than 1,400 Citadel botnets. Awareness and education are needed ,” as users, developers, manufacturers, and infrastructure operators all can lack the knowledge and capabilities to protect the Internet. in isolation.”.