One Method Malware Uses to Bypass Detection

Discussion in 'malware problems & news' started by mattfrog, Jun 22, 2012.

Thread Status:
Not open for further replies.
  1. mattfrog

    mattfrog Registered Member

    Joined:
    Apr 3, 2012
    Posts:
    85
    Location:
    United Kingdom
    http://blog.fireeye.com/research/2012/06/bypassing-process-monitoring-.html
     
  2. kareldjag

    kareldjag Registered Member

    Joined:
    Nov 13, 2004
    Posts:
    622
    Location:
    PARIS AND ITS SUBURBS
    Hi
    Known method and nothing new under the sun for this marketing blog post (our product is better than other blah blah blah...).
    Since the rise of modern rootkits any serious security AV or security vendor has improved its product to stay valuable in this highly competitive industry.

    Rgds
     
  3. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,224
    I call that TL ; DR.
    Mrk
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.