Hackers aren’t the only ones out there developing malware tools, but sometimes, they get their hands on some of the others. This is precisely what happened when Double Pulsar, a malware that the NSA has used in the past, was paired with a Chinese hacking tool and used to attack Hong Kong and Belgium in 2016.
Mobile? Grab this Article!
Best Practices Healthcare Hardware Amazon Bandwidth Data Breach Training disposal Efficiency Remote Computing Voice over IP Business Computing Personal Information Technology Online Shopping Outsourced IT Internet of Things Phishing Windows 10 Office Display Mobility Plug-In Lead Generation Database BYOD Patch Management Mobile Device Wi-Fi Networking Save Money Big Data Printers Certification SSD Specifications Innovation Network Attached Storage Vulnerability Telephony Net Neutrality Time Management Network Security Workers Congratulations Authentication G Suite Paperless Office Managed Service Authorization Email Health Windows Server 2008 R2 Business Continuity Microsoft Analytics Apps Access Control Virtual Assistant Business Hosted Solutions IT Management Movies Users SaaS A.I. Hackers Miscellaneous User Tip Telecommuting Small Business Social Media Gmail Internet Explorer Cables Thank You Computers Information Battery Collaboration Virus GDPR Twitter Employees VPN Password Data Protection Managing Stress Operating System Vulnerabilities Android Cloud Employer-Employee Relationship Tactics Cortana Outlook Wireless Downloads Mobile Security Document Management Update Laptop Windows National Security IT Services e-waste Blockchain PowerPoint Processor Comparison Data Backup Streaming Media Holiday Business Management HP Websites Microsoft Office 365 Taskbar Artificial Intelligence Microsoft Office Cloud Computing Unified Communications Data loss Benchmarks Help Desk IT budget Applications Microsoft Teams Office 365 Wireless Internet Compliance WannaCry instant Messaging Voice over Internet Protocol Data Management Workplace Tips Video RAM Cryptocurrency Ransomware Maintenance Automation Internet Updates Remote Monitoring and Management Medical IT Proactive IT BDR Tech Term Alert Company Culture Human Resources Safety Cybercrime Backup and Disaster Recovery Server OneNote Physical Security Value Government Edge Bring Your Own Device Eliminating Downtime Staff Marketing Electronic Health Records Browser Troubleshooting Saving Money Tip of the week Word Ink Risk Management Tech Terms Machine Learning Spyware Managed IT Services Hard Disk Drive Employee-Employer Relationship Hybrid Cloud E-Commerce Antivirus Dark Web Malware Router Printing Chrome Privacy Cybersecurity Touchscreen Sports Mobile Devices Paper Quick Tips User Tips Productivity Settings Backup Solid State Drive VoIp Security Cameras eCommerce Server Management Business Intelligence Profitability Facebook Smartphones Hard Drive Passwords Communication Managed IT services Tip of the Week Millennials Spam Environment Cost Management Smartphone Telecommute Google Disaster Recovery Data Security Content Filtering Hard Drives Managed IT Service Threat Dongle Software Network Inventory Gadgets IT Support Technology Tips Reporting Wireless Charging Payment Connectivity Wearables Virtualization Excel Processors Data recovery Conferencing Chrome OS Analysis Data HIPAA Trends Computer Security Digital Error Windows 7 Customer Service Storage Upgrade Communications