Articles by Cert-IST
Cert-IST writes articles in which it analyzes the IT security news. These articles are first published in the monthly bulletin sent to its members. A couple of months later some of these articles are made public in this section of the website.
9 article(s) - 2011
![Operation Ghost Click: An international network using the DNSChanger malware dismantled](/pub/images/imageDoc/imageDoc28.png)
Operation Ghost Click: An international network using the DNSChanger malware dismantled
December 1, 2011
![The Shady RAT cyberattack](/pub/images/imageDoc/imageDoc26.png)
![iOS versus Android, what is the most secure platform?](/pub/images/imageDoc/imageDoc24.png)
![Report for the SSTIC 2011 conference](/pub/images/imageDoc/imageDoc07.png)
![CVRF (Common Vulnerability Reporting Framework)](/pub/images/imageDoc/imageDoc18.png)
!["Blackhat SEO" and distribution of malwares](/pub/images/imageDoc/imageDoc24.png)
![JSSI 2011 conference report](/pub/images/imageDoc/imageDoc28.png)
![Zozzle and Blade Defender: two malware detection tools](/pub/images/imageDoc/imageDoc25.png)
![ENISA report on smartphone security](/pub/images/imageDoc/imageDoc06.png)