Common Malware Evasion Techniques

Tuesday, June 20, 2017

“We can classify evasion techniques into three broad categories: Anti-security techniques: Used to avoid detection by antimalware engines, firewalls, application containment, or other tools that protect the environment. Anti-sandbox techniques: Used to detect automatic analysis and avoid engines that report on the behavior of malware. Detecting registry keys, files, or processes related to virtual environments lets malware know if it is running in a sandbox. Anti-analyst techniques: Used to detect and fool malware analysts, for example, by spotting monitoring tools such as Process Explorer or Wireshark, as well as some process-monitoring tricks, packers, or obfuscation to avoid reverse engineering.In the world of cybersecurity evasion, certain terms are popular. Here are some...

The Science Of Cybersecurity – Book

Tuesday, May 30, 2017

“How can we characterise Cybersecurity? How do data breaches, hacks, system exploits and computer intrusions happen - and why? What occurs when Cybersecurity really works effectively, and can we systemise it? Or will the clever hacker always break into any networked device, sweeping all defences aside? On a quest for insightful answers in this ground-breaking book, Dr Alan Radley proceeds to completely deconstruct, rationally analyse, meticulously rebuild and then sanely reassess the entire field of Cybersecurity.  A rigorous scientific methodology is applied to networked system design, leading to a comprehensive new model - and accurate taxonomic tree - of...
no comments