One Method Malware Uses to Bypass Detection

Discussion in 'malware problems & news' started by mattfrog, Jun 22, 2012.

Thread Status:
Not open for further replies.
  1. mattfrog

    mattfrog Registered Member

    http://blog.fireeye.com/research/2012/06/bypassing-process-monitoring-.html
     
  2. kareldjag

    kareldjag Registered Member

    Hi
    Known method and nothing new under the sun for this marketing blog post (our product is better than other blah blah blah...).
    Since the rise of modern rootkits any serious security AV or security vendor has improved its product to stay valuable in this highly competitive industry.

    Rgds
     
  3. Mrkvonic

    Mrkvonic Linux Systems Expert

    I call that TL ; DR.
    Mrk
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice