Category Archives: Malware Analysis
The nitty-gritty technical details from our malware researchers and developers about all the nastiest malware out there.
This morning, Michael Callahan of Juniper Networks posted an article on SecurityWeek.com about distributed denial of service, or DDOS, called “Take a Broader, Deeper, Wider Bite out of Cybercrime.” A DDOS attack is when numerous client systems send massive amounts of network traffic to a single web server in the hopes of making it impossible […]
Malware today is so numerous and diverse that security professionals have known for some time that signature based solutions would no longer be able to cut it alone. Not only are there too many new malware files each day, some of them are able to change their shape and signature as they go along. But,if […]
A couple of months ago, I did an article on generic obfuscation techniques used to hide malware. It continues to be no surprise that malware tries to hide using an array of techniques that are easy to implement. I wanted to elaborate on one of those techniques I mentioned earlier, which was the exclusive or […]
As researchers find more security flaws in Oracle Java, the software continues to be used for exploitation and malware delivery. This year has been a shaky start for the cross-platform web technology, where it seems the number of documented vulnerabilities is hard to number. If you recall in January, we saw a zero-day later found […]