You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Today some students asked how malware such as Trojan horse gets into the system. As I mentioned, traditionally, it has been spread via SW download from untrusted sources (e.g., illegal sites, black market, etc). But see this recent security issue that attackers intentionally bury malware in a well-known Github repository (php).
This discussion was converted from issue #27 on December 28, 2024 04:45.
Heading
Bold
Italic
Quote
Code
Link
Numbered list
Unordered list
Task list
Attach files
Mention
Reference
Menu
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
Today some students asked how malware such as Trojan horse gets into the system. As I mentioned, traditionally, it has been spread via SW download from untrusted sources (e.g., illegal sites, black market, etc). But see this recent security issue that attackers intentionally bury malware in a well-known Github repository (php).
What can we trust and how to protect the systems?
Beta Was this translation helpful? Give feedback.
All reactions