Although for many it’s hard to believe, there was a time when malware was not a tool created to generate as much money as possible. The main motivations of those old-school hackers were such earthly things as fun or some…
Although for many it’s hard to believe, there was a time when malware was not a tool created to generate as much money as possible. The main motivations of those old-school hackers were such earthly things as fun or some…
The hiding of information in places that initially seem innocuous has been and is a widely used method. The biggest advantage of steganography is that sent messages can go completely unnoticed, since no one can think that they hide something…
Although many people have never heard of them, backdoors are one of the most frequently methods used nowadays to perform malicious attacks. Leaving aside the specific case of the backdoors in cryptographic algorithms, backdoors allows access to a particular computer…
Exploit kits are the cause of a large percentage of malware infections that occur nowadays. Depending on the side where you are, you will consider exploit kits a godsend or a hellish curse. They are toolsets to automatically exploit vulnerabilities on the client…
Malware on mobile devices is very common. Although this is something quite obvious to anyone in the world of security, many people still think that their smartphone or tablet this out of any danger. Lately the Android world has gone through difficult times,…
Performing a dynamic analysis of a malware sample is quick and can bring large amounts of data to perform a more complete and complex manual analysis. There are many sandboxes (controlled environments) that analyze a binary to know what exactly…