http://www.infosecurity-magazine.com/rss/news/76/application-security/
The backdoor allowed attackers to upload and download files, execute commands and remove their footprint
Read the original article:
http://www.infosecurity-magazine.com/rss/news/76/application-security/
The backdoor allowed attackers to upload and download files, execute commands and remove their footprint
Read the original article: