Malware architectures – part 6 (Obfuscation)
Now that the malware has made itself home to the targeted computer system, its time to hide its tracks and build up … Read More “Malware architectures – part 6 (Obfuscation)”
Now that the malware has made itself home to the targeted computer system, its time to hide its tracks and build up … Read More “Malware architectures – part 6 (Obfuscation)”
Now that the malware has taken root of the system, has its own processes running and has gained enough privileges … Read More “Malware architectures – part 5 (Persistence)”
In previous posts we talked about how a malware package/code gets into a system, this post will explain how it … Read More “Malware architectures – part 4 (Taking Control)”
In part one of this series we explained the different stages of the malware life-cycle. This post will cover in … Read More “Malware architectures – part 2 (Exploitation)”
Malware has plagued computing for the last three decades. Over time two industries formed; The Anti-Malware companies trying to prevent … Read More “Malware architectures – part 1”