Hackers aren’t the only ones out there developing malware tools, but sometimes, they get their hands on some of the others. This is precisely what happened when Double Pulsar, a malware that the NSA has used in the past, was paired with a Chinese hacking tool and used to attack Hong Kong and Belgium in 2016.
Mobile? Grab this Article!
Tip of the Week Security Technology Best Practices Network Security Business Computing Data Productivity Privacy Hackers Malware User Tips Efficiency Microsoft Google Innovation Tech Term Cybersecurity Communication Smartphones IT Support Managed IT Services Mobile Device Computer Hardware Email Internet Ransomware Users Windows 10 Android Small Business Mobile Devices Software Communications Workplace Tips Passwords Outsourced IT Cloud Browser Business Data Backup IT Services Collaboration Business Management VoIp Data Recovery Miscellaneous Network Backup Gadgets Information Hosted Solutions Applications Internet of Things Social Media Smartphone Managed Service Apps Wi-Fi Upgrade Employer-Employee Relationship Windows Managed IT services Microsoft Office Value Wireless Blockchain Business Intelligence Bandwidth Saving Money Cloud Computing Holiday Gmail Laptop Office 365 Networking Cybercrime Marketing VPN Business Continuity Chrome Artificial Intelligence Facebook Word Compliance Save Money Data security Phishing Managed IT Service Government G Suite Data Breach Payment Cards Operating System Settings Password Excel Telephony Office Medical IT Analytics RAM Apple Remote Monitoring and Management Avoiding Downtime Law Enforcement Going Green Paperless Office Net Neutrality Patch Management Processor Quick Tips Data Management Cost Management Healthcare Connectivity Router Computers Remote Computing BDR Company Culture Wireless Charging Batteries Tech Terms Employee-Employer Relationship Voice over Internet Protocol Virtual Assistant Mobility Data Protection Virtualization Automation Access Control Cortana How To Reporting Time Management Insurance Backup and Disaster Recovery Troubleshooting Server Machine Learning Internet Explorer PowerPoint Payment Unified Communications Authentication Sales Customer Service disposal Vulnerability Proactive IT Tip of the week Travel Downloads Error User Security Health Social Network Inventory Wireless Internet HIPAA Security Cameras Document Management Antivirus Sports Workers Chrome OS File Management Hard Drives Mobile Device Management Bring Your Own Device Update Updates instant Messaging Threats Dongle Authorization Tablet OneNote Threat User Tip Staff Trends Voice over IP Employees IT Management Mobile Security Recovery Amazon Help Desk Content Filtering Hard Drive Wearables SaaS File Sharing Millennials Current Events SSD Hybrid Cloud Outlook Telecommute Managed IT Vulnerabilities Scams Microsoft Teams Battery Windows Server 2008 R2 Server Management Database Tools iPhone Printing Analysis Digital A.I. Touchscreen Solid State Drive Certification Processors Recycling GDPR Human Resources Mobile Office Redundancy Cables Profitability Comparison Lead Generation Display Data loss Cryptocurrency Project Management Big Data Knowledge Taskbar Tactics Paper Edge Websites Movies Microsoft Office 365 Business Technology eCommerce Hard Disk Drive Environment Personal Information Storage Managed Services Provider IT budget Start Menu Eliminating Downtime Specifications Benchmarks Spyware Spam Telecommuting Windows 7 Search Physical Security Technology Tips Remote Monitoring Managing Stress National Security Maintenance Ink E-Commerce Bitcoin Safety Online Shopping Video Network Attached Storage e-waste Plug-In Botnet Streaming Media Dark Web Electronic Health Records Vendor Twitter BYOD Conferencing WannaCry Training Risk Management HP Virus Financial Disaster Recovery Alert Thank You Printers WiFi Emergency Congratulations