Chapter 2. Solutions in this chapter:
Introduction
Several MM attacks are visible to the end user. For example, Skulls changes all icons to that of a skull. Images of MM are included in this chapter, along with a short notation of changes visible to the user. For more detailed information on specific MM types mentioned in this chapter, see chapter four on MM families, and the F-Secure Corp. Web site at www.f-secure.com/virus-info/v-pics/. All images in this chapter are provided courtesy of F-Secure Corp.
F-Secure RF Lab
This chapter would not be complete without a few images (Figures 2.1 through 2.3) of the impressive F-Secure Corp. RF lab. It's a secure ...
Get Mobile Malware Attacks and Defense now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.