September 11, 2012
Malware architectures – part 6 (Obfuscation)
Now that the malware has made itself home to the targeted computer system, its time to hide its tracks and build up … Read More “Malware architectures – part 6 (Obfuscation)”