//
you're reading...
IT, Security

Analysis of a Malware attack

Here’s a good example of how malware is written to exploit “holes” in software in unexpected ways and how complexly they can be hidden, onion layers.
analysis-targeted-trojan
Well written by Martin Lee, Senior Software Engineer, Symantec.cloud with contributions from Anoirel Issa and Joseph Rabaiotti

– Posted using BlogPress from my iPhone

About harlekwinblog

"Thoughts of an idle mind." Information Security professional.

Discussion

No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: