Malware analysis January 27, 2015 Dejan Lukan Overview of Automated Malware Analysis in the Cloud Malicious attackers are constantly on the lookout for new and advanced attacks, which they use to spread malware around the world. There are a vast number of...
Malware analysis January 5, 2015 Pavitra Shankdhar SoakSoak Malware and How to Protect Your WordPress Website If you follow security news, I am sure you have heard of SoakSoak malware. It has been in the news for the past few days because it affects more than 100,000+...
Malware analysis December 26, 2014 Shaman Vilen Evolution of Banking Malwares, Part 2 This technique is used in scenarios where critical information such as Social Security Number (SSN) or Personal Identification Number (PIN) is otherwise not...
Malware analysis December 24, 2014 Shaman Vilen Evolution of Banking Malwares, Part 1 Why are malware authors so interested in banking malware? Simply because this is where the money is! Nowadays, banking malware, specifically banking Trojans,...
Malware analysis May 29, 2014 Infosec A History of Malware: Part Three, 1993-1999 In my previous article, I explained what happened to the evolution of malware when microcomputers started to become a major presence in small offices and households....
Malware analysis May 19, 2014 Infosec A History of Malware: Part Two, 1989-1992 In my previous article, I told the story of the very first worms and viruses. Interestingly, a groundbreaking mathemetician, John von Neumann, and a science...
Malware analysis May 13, 2014 Infosec A History of Malware: Part One, 1949-1988 These days, malware is an everyday concern, even among ordinary end users. A countless amount of money is lost every year worldwide due to malware, possibly...
Malware analysis February 14, 2014 Darmawan Salihun NSA Backdoor Part 2, BULLDOZER: And, Learn How to DIY a NSA Hardware Implant This article is the second part of a series on NSA BIOS Backdoor internals. This part focuses on BULLDOZER, a hardware implant acting as malware dropper and...
Malware analysis October 9, 2013 Aparajit i Portable Malware Lab for Beginners – Part 2 In the previous article, "Portable Malware Lab for Beginners," I spoke about nested virtual machines, i.e., deploying a virtual machine with QEMU and Cuckoo....
Malware analysis September 6, 2013 Steve Lynch The Hunt for Memory Malware Memory forensic is a skill to find out all the artifacts in the memory that is present in the running computer. It is an interesting method to find out what...