The Latest in IT Security

Malware Pieces Use Several Techniques to Avoid Investigative Efforts

27
Aug
2014

More sophisticated threats rely on various techniques not just to avoid antivirus detection but also to prevent security researchers from taking a closer look at their inner mechanisms.Analyzing malware is generally done in virtual spaces (sandbox utility or virtual machines), which are isolated environments designed to contain all the modifications to themselves and do not allow changes to be made on the real machine.As such, these make for a perfect tool for security researchers to investiga…

Comments are closed.

Categories

THURSDAY, DECEMBER 14, 2017

Featured

Archives

Latest Comments

Social Networks