PGPCoder: Difference between revisions

Content deleted Content added
Fact tags for stuff nbot found inthe credited sources - need precise cites
m space
Line 17:
antivirus companies have been able to develop a complete "cure" for the
data modifications that this Trojan makes.{{Fact|date=June 2008}}<!-- not present in sources credited below --> It follows that PGPcoder is not a true
cryptotrojan.{{Fact|date=June 2008}}<!-- conclusion not present in sources credited below --> A cryptovirus, cryptotrojan, or cryptoworm contains and uses the
A cryptovirus, cryptotrojan, or cryptoworm contains and uses the
public key of the attacker. In cryptoviral extortion, the malware hybrid encrypts
the victim's data using the attacker's public key. Analysis of the malware does not