• Boot camps & training
  • Awareness & anti-phishing
  • Community
Infosec Resources Home
  • Topics
    • Cyber ranges
      Threat Intelligence
      General security
      Hacking
      Healthcare information security
    • Penetration testing
      Phishing
      Data breach
      Insider threat
    • Capture the flag (CTF)
      Data recovery
      DoD 8570
      Security awareness
      + View All
  • Certification prep
    • CISSP
      CCSP
      CGEIT
      CEH
      CCNA
    • CISA
      CISM
      CRISC
      A+
      Network+
    • Security+
      CASP+
      PMP
      CySA+
    • CMMC
      CSIH
      Microsoft Azure
      Other
      + View All
  • Career guidance
    • IT auditor
      Cybersecurity architect
      Cybercrime investigator
      Penetration tester
    • Cybersecurity consultant
      Cybersecurity analyst
      Cybersecurity engineer
      Cybersecurity manager
    • Incident responder
      Information security auditor
      Information security manager
      + View All
  • Events
  • Podcast
  • About
    • Contributors
  • Search
  • Main Menu

Matthew Jones

Malware analysis March 26, 2020 Matthew Jones
What Are Packed Executables?
The battle between cybersecurity and malicious files is ever-changing, as the goalposts are always being moved. Whenever analysts figure out a way to reverse-engineer...
Malware analysis March 26, 2020 Matthew Jones
Top 13 Popular Packers Used in Malware
Malware can wreak havoc on just about any system, and packers help malware stay one step ahead of security software. But what exactly do packers do? How can...
Cybersecurity data science December 2, 2019 Matthew Jones
Practical Cybersecurity Data Science: Essential Knowledge and Tools
Protecting home and business computers from data breaches requires the implementation of cybersecurity protocols. Protocols can be as simple as two-factor...
Infosec Resources Home

Join our newsletter

Get the latest news, updates & offers straight to your inbox.
  • This field is for validation purposes and should be left unchanged.
© 2021 Infosec Resources
  • Privacy Policy
Topics
  • Cyber ranges
  • Threat Intelligence
  • General security
  • Hacking
  • Healthcare information security
  • Penetration testing
  • Phishing
  • Data breach
  • Insider threat
  • Capture the flag (CTF)
  • Data recovery
  • DoD 8570
  • Security awareness
  • + See All Topics
Certifications
  • CISSP
  • CCSP
  • CGEIT
  • CEH
  • CCNA
  • CISA
  • CISM
  • CRISC
  • A+
  • Network+
  • Security+
  • CASP+
  • PMP
  • CySA+
  • CMMC
  • CSIH
  • Microsoft Azure
  • Other
  • + See All Certifications
CyberSecurity Careers
  • IT auditor
  • Cybersecurity architect
  • Cybercrime investigator
  • Penetration tester
  • Cybersecurity consultant
  • Cybersecurity analyst
  • Cybersecurity engineer
  • Cybersecurity manager
  • Incident responder
  • Information security auditor
  • Information security manager
  • + See All Careers