Malware analysis is the study or process of determining the functionality, origin and potential impact of a given malware sample such as a virus, worm... 6 KB (622 words) - 03:24, 15 April 2023 |
itself. Fighting the entities that create these is a topic of ongoing malware analysis. Attacks known as phishing, in which an attacker pretends to be some... 8 KB (854 words) - 00:02, 2 April 2024 |
Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network... 73 KB (7,384 words) - 18:52, 8 May 2024 |
macOS malware includes viruses, trojan horses, worms and other types of malware that affect macOS, Apple's current operating system for Macintosh computers... 7 KB (744 words) - 21:36, 30 November 2023 |
Flame, also known as Flamer, sKyWIper, and Skywiper, is modular computer malware discovered in 2012 that attacks computers running the Microsoft Windows... 30 KB (2,604 words) - 20:49, 1 May 2024 |
Petya is a family of encrypting malware that was first discovered in 2016. The malware targets Microsoft Windows–based systems, infecting the master boot... 52 KB (4,238 words) - 18:25, 7 May 2024 |
IDA is used widely in software reverse engineering, including for malware analysis and software vulnerability research. IDA has been referred to as the... 18 KB (1,700 words) - 08:25, 16 April 2024 |
Kruegel, Christopher (2008-03-05). "A survey on automated dynamic malware-analysis techniques and tools". ACM Computing Surveys. 44 (2): 6:1–6:42. doi:10... 17 KB (1,864 words) - 01:44, 13 April 2024 |
malware infection in the internet. The group is known for their malware analysis blog. They have a list of Linux malware research and botnet analysis... 22 KB (1,718 words) - 02:13, 15 March 2024 |
Zero-day vulnerability (redirect from Next-generation malware) Typically, malware has characteristic behaviour; code analysis attempts to detect if this is present in the code. Although useful, code analysis has significant... 25 KB (2,685 words) - 07:18, 9 May 2024 |
YARA (category Malware stubs) a tool primarily used in malware research and detection. It provides a rule-based approach to create descriptions of malware families based on regular... 2 KB (169 words) - 06:52, 12 April 2024 |
Linux malware includes viruses, Trojans, worms and other types of malware that affect the Linux family of operating systems. Linux, Unix and other Unix-like... 57 KB (4,794 words) - 22:41, 29 April 2024 |
recovering source code of a program whose original source was lost, malware analysis, modifying software (such as ROM hacking), and software cracking. A... 13 KB (1,437 words) - 19:31, 20 March 2024 |
Forensic science (redirect from Forensic analysis) practices such as the analysis of DNA, fingerprints, bloodstain patterns, firearms, ballistics, toxicology, microscopy and fire debris analysis. Forensic scientists... 96 KB (11,061 words) - 04:57, 6 May 2024 |
Victor (2015). Windows Malware Analysis Essentials. Packt Publishing Ltd. ISBN 9781785281518. "6 Hex Editors for Malware Analysis". SANS Digital Forensics... 8 KB (871 words) - 18:11, 7 March 2024 |
proper evidence-gathering methods. Through other processes, such as malware analysis, threat intelligence can be produced. Utility: For threat intelligence... 17 KB (1,826 words) - 06:58, 7 May 2024 |
Fingerprint (redirect from Fingerprint analysis) appropriate characteristic to measure quantitatively) which complicates analysis of dermatoglyphic patterns. Several modes of inheritance have been suggested... 112 KB (11,944 words) - 19:43, 7 May 2024 |
Computer forensics (redirect from Cross-drive analysis) document (e.g., an email message or JPEG image). The scope of a forensic analysis can vary from simple information retrieval to reconstructing a series of... 27 KB (2,976 words) - 08:40, 6 May 2024 |
Forensic Examiner Forensics 4 years N/A GREM Reverse Engineering Malware Malware Analysis 4 years N/A GNFA Network Forensic Analyst Forensics 4 years N/A... 51 KB (872 words) - 20:54, 4 March 2024 |
potentially malicious code from files. Unlike malware analysis, CDR technology does not determine or detect malware's functionality but removes all file components... 4 KB (403 words) - 00:40, 12 July 2023 |
Mirai (from the Japanese word for "future", 未来) is malware that turns networked devices running Linux into remotely controlled bots that can be used as... 39 KB (3,447 words) - 21:15, 25 April 2024 |
an open-source memory forensics framework for incident response and malware analysis. It is written in Python and supports Microsoft Windows, Mac OS X,... 4 KB (480 words) - 00:52, 7 March 2023 |
DNA profiling (redirect from DNA Analysis) determining an individual's deoxyribonucleic acid (DNA) characteristics. DNA analysis intended to identify a species, rather than an individual, is called DNA... 104 KB (11,519 words) - 19:55, 5 May 2024 |
Forensic linguistics (redirect from Stylistic analysis) used it in "The Evans Statements: A Case for Forensic Linguistics" an analysis of statements by Timothy John Evans. It was in regard to re-analyzing the... 64 KB (8,763 words) - 02:37, 9 May 2024 |
cloud-based anti-malware services for protecting businesses against web-based malware and malvertising. Dasient's Web Malware Analysis Platform uses a... 6 KB (406 words) - 04:16, 3 April 2023 |
Fileless malware is a variant of computer related malicious software that exists exclusively as a computer memory-based artifact i.e. in RAM. It does... 14 KB (1,467 words) - 22:39, 29 April 2024 |
determination of a DNA profile for legal and investigative purposes. DNA analysis methods have changed countless times over the years as technology changes... 23 KB (2,689 words) - 21:29, 5 May 2024 |