Top
Malware Pieces Use Several Techniques to Avoid Investigative Efforts

Malware Pieces Use Several Techniques to Avoid Investigative Efforts

August 27, 2014

More sophisticated threats rely on various techniques not just to avoid antivirus detection but also to prevent security researchers from taking a closer look at their inner mechanisms.Analyzing malware is generally done in virtual spaces (sandbox utility or virtual machines), which are isolated environments designed to contain all the modifications to themselves and do not allow changes to be made on the real machine.As such, these make for a perfect tool for security researchers to investiga…