Complex Method of Obfuscation Found in Dropper RealShell

The fight against malware is never-ending for a threat researcher, and in the mobile malware arena the fight is becoming more complex at an accelerated rate as the malware authors continue to create new ways of obfuscation.

Read more

Five PE Analysis Tools Worth Looking At

In the world of malware analysis, having the right tools can make all the difference. Fortunately, there are many to choose from.

Read more

Malware with Packer Deception Techniques

Find out how malware fools common file scanners.

Read more

Malicious Messages Foray Facebook

A trojan is circulating through Facebook stealing accounts and (probably) taking creds.

Read more

Observing COM within Malicious Code

How malware leverages the Component Object Model

Read more

Select your language