//
you're reading...
IT, Security

Analysis of a Malware attack

Here’s a good example of how malware is written to exploit “holes” in software in unexpected ways and how complexly they can be hidden, onion layers.
analysis-targeted-trojan
Well written by Martin Lee, Senior Software Engineer, Symantec.cloud with contributions from Anoirel Issa and Joseph Rabaiotti

– Posted using BlogPress from my iPhone

Advertisements

About harlekwinblog

"Thoughts of an idle mind." Information Security professional.

Discussion

No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Categories

RSS This Blog…

  • An error has occurred; the feed is probably down. Try again later.

Share me…

Bookmark and Share

Twitter Updates

January 2011
S M T W T F S
« Dec   Feb »
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
%d bloggers like this: