you're reading...
IT, Security

Analysis of a Malware attack

Here’s a good example of how malware is written to exploit “holes” in software in unexpected ways and how complexly they can be hidden, onion layers.
Well written by Martin Lee, Senior Software Engineer, Symantec.cloud with contributions from Anoirel Issa and Joseph Rabaiotti

– Posted using BlogPress from my iPhone

About harlekwinblog

"Thoughts of an idle mind." Information Security professional.


No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: