• Malware analysis is the study or process of determining the functionality, origin and potential impact of a given malware sample such as a virus, worm...
    6 KB (622 words) - 03:24, 15 April 2023
  • Thumbnail for Facebook malware
    itself. Fighting the entities that create these is a topic of ongoing malware analysis. Attacks known as phishing, in which an attacker pretends to be some...
    8 KB (854 words) - 00:02, 2 April 2024
  • Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network...
    73 KB (7,384 words) - 18:52, 8 May 2024
  • macOS malware includes viruses, trojan horses, worms and other types of malware that affect macOS, Apple's current operating system for Macintosh computers...
    7 KB (744 words) - 21:36, 30 November 2023
  • Flame, also known as Flamer, sKyWIper, and Skywiper, is modular computer malware discovered in 2012 that attacks computers running the Microsoft Windows...
    30 KB (2,604 words) - 20:49, 1 May 2024
  • Thumbnail for Petya (malware family)
    Petya is a family of encrypting malware that was first discovered in 2016. The malware targets Microsoft Windows–based systems, infecting the master boot...
    52 KB (4,238 words) - 18:25, 7 May 2024
  • Thumbnail for Interactive Disassembler
    IDA is used widely in software reverse engineering, including for malware analysis and software vulnerability research. IDA has been referred to as the...
    18 KB (1,700 words) - 08:25, 16 April 2024
  • Thumbnail for Bloodstain pattern analysis
    Bloodstain pattern analysis (BPA) is a forensic discipline focused on analyzing bloodstains left at known, or suspected crime scenes through visual pattern...
    39 KB (4,857 words) - 15:54, 11 April 2024
  • Kruegel, Christopher (2008-03-05). "A survey on automated dynamic malware-analysis techniques and tools". ACM Computing Surveys. 44 (2): 6:1–6:42. doi:10...
    17 KB (1,864 words) - 01:44, 13 April 2024
  • Thumbnail for MalwareMustDie
    malware infection in the internet. The group is known for their malware analysis blog. They have a list of Linux malware research and botnet analysis...
    22 KB (1,718 words) - 02:13, 15 March 2024
  • Typically, malware has characteristic behaviour; code analysis attempts to detect if this is present in the code. Although useful, code analysis has significant...
    25 KB (2,685 words) - 07:18, 9 May 2024
  • YARA (category Malware stubs)
    a tool primarily used in malware research and detection. It provides a rule-based approach to create descriptions of malware families based on regular...
    2 KB (169 words) - 06:52, 12 April 2024
  • Thumbnail for Palo Alto Networks
    original on September 14, 2018. Retrieved September 13, 2018. "Wildfire Malware Analysis - Palo Alto Networks". 2018. Archived from the original on September...
    35 KB (2,983 words) - 05:14, 10 March 2024
  • Linux malware includes viruses, Trojans, worms and other types of malware that affect the Linux family of operating systems. Linux, Unix and other Unix-like...
    57 KB (4,794 words) - 22:41, 29 April 2024
  • recovering source code of a program whose original source was lost, malware analysis, modifying software (such as ROM hacking), and software cracking. A...
    13 KB (1,437 words) - 19:31, 20 March 2024
  • Thumbnail for Forensic accounting
    tax fraud that was discovered by forensic accountants. Wilson's diligent analysis of the financial records of Al Capone indicted him for federal income tax...
    23 KB (2,568 words) - 06:39, 28 April 2024
  • Thumbnail for Forensic science
    practices such as the analysis of DNA, fingerprints, bloodstain patterns, firearms, ballistics, toxicology, microscopy and fire debris analysis. Forensic scientists...
    96 KB (11,061 words) - 04:57, 6 May 2024
  • Victor (2015). Windows Malware Analysis Essentials. Packt Publishing Ltd. ISBN 9781785281518. "6 Hex Editors for Malware Analysis". SANS Digital Forensics...
    8 KB (871 words) - 18:11, 7 March 2024
  • proper evidence-gathering methods. Through other processes, such as malware analysis, threat intelligence can be produced. Utility: For threat intelligence...
    17 KB (1,826 words) - 06:58, 7 May 2024
  • Thumbnail for Fingerprint
    appropriate characteristic to measure quantitatively) which complicates analysis of dermatoglyphic patterns. Several modes of inheritance have been suggested...
    112 KB (11,944 words) - 19:43, 7 May 2024
  • Thumbnail for Computer forensics
    document (e.g., an email message or JPEG image). The scope of a forensic analysis can vary from simple information retrieval to reconstructing a series of...
    27 KB (2,976 words) - 08:40, 6 May 2024
  • Forensic Examiner Forensics 4 years N/A GREM Reverse Engineering Malware Malware Analysis 4 years N/A GNFA Network Forensic Analyst Forensics 4 years N/A...
    51 KB (872 words) - 20:54, 4 March 2024
  • potentially malicious code from files. Unlike malware analysis, CDR technology does not determine or detect malware's functionality but removes all file components...
    4 KB (403 words) - 00:40, 12 July 2023
  • Mirai (from the Japanese word for "future", 未来) is malware that turns networked devices running Linux into remotely controlled bots that can be used as...
    39 KB (3,447 words) - 21:15, 25 April 2024
  • an open-source memory forensics framework for incident response and malware analysis. It is written in Python and supports Microsoft Windows, Mac OS X,...
    4 KB (480 words) - 00:52, 7 March 2023
  • Thumbnail for DNA profiling
    DNA profiling (redirect from DNA Analysis)
    determining an individual's deoxyribonucleic acid (DNA) characteristics. DNA analysis intended to identify a species, rather than an individual, is called DNA...
    104 KB (11,519 words) - 19:55, 5 May 2024
  • Thumbnail for Forensic linguistics
    used it in "The Evans Statements: A Case for Forensic Linguistics" an analysis of statements by Timothy John Evans. It was in regard to re-analyzing the...
    64 KB (8,763 words) - 02:37, 9 May 2024
  • cloud-based anti-malware services for protecting businesses against web-based malware and malvertising. Dasient's Web Malware Analysis Platform uses a...
    6 KB (406 words) - 04:16, 3 April 2023
  • Fileless malware is a variant of computer related malicious software that exists exclusively as a computer memory-based artifact i.e. in RAM. It does...
    14 KB (1,467 words) - 22:39, 29 April 2024
  • Thumbnail for Forensic DNA analysis
    determination of a DNA profile for legal and investigative purposes. DNA analysis methods have changed countless times over the years as technology changes...
    23 KB (2,689 words) - 21:29, 5 May 2024