Investigating malware, including the different types of malware, persistence mechanisms, using external research
INFORMATION INCLUDED IN THIS CHAPTER:
• Malware Categories
• Using Malware Researchers
• Infection Vectors
• Malware Artifacts
It is difficult to start this without using some hackneyed, clichéd expression that dramatically understates the challenge or does not put it into some useful perspective. The short version is that malware is a problem. There are millions of new types of malware developed each year. This may be an existing piece of malware that is just different enough to require a new signature, means that the ...
Get Operating System Forensics now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.