Citizen Lab Technical Brief: IEXPL0RE RAT
In this technical brief, Citizen Lab Senior Security Analyst Seth Hardy presents a detailed analysis of IEXPL0RE RAT, a remote access trojan targeting human rights-related organizations.
Citizen Lab's latest news and announcements.
In this technical brief, Citizen Lab Senior Security Analyst Seth Hardy presents a detailed analysis of IEXPL0RE RAT, a remote access trojan targeting human rights-related organizations.
The August 2012 issue of Southeast Asia CyberWatch covers related developments in Malaysia, Myanmar, Singapore, Thailand, Indonesia and Vietnam.
Citizen Lab Post-Doctoral Fellow Stefania Milan will be participating at the Inter-Asia Roundtable 2012: Methodological and Conceptual Issues in Cyber Activism Research conference at the National University of Singapore on August 30-31, 2012.
This issue of the Middle East and North Africa Cyber Watch covers topics such as censorship and filtering, blogger arrests, cyber attacks, Internet and social media use, and technology.
Luum is seeking an Online Technology Policy Designer to develop governance models and user policies for their new online platform. The position will be based in Toronto, collocated at the Citizen Lab, at the Munk School of Global Affairs, University of Toronto.
The Citizen Lab has a full-time opening for a Software Developer to engage in software development to support a range of research projects at the intersection of information communications technologies, global security, and human rights.
This edition of the MENA Cyber Watch covers topics such as censorship and filtering, blogger arrests, cyber attacks and more.
We are pleased to announce that Phillipa Gill has joined us as a Post-Doctoral Fellow.
The July 2012 issue of Southeast Asia CyberWatch covers related developments in Malaysia, Myanmar, Singapore, Thailand, and Vietnam.
This issue of the Middle East and North Africa (MENA) Cyber Watch covers issues such as blogger and netizen arrests, Internet and social media use, censorship and filtering, hacktivism, government control, and cyber warfare.