HACKINTOSH.ORG | Macintosh discussion forums

Security Discussions => Mac Security News => Topic started by: HCK on July 08, 2013, 11:01:08 pm



Title: How Malware is Researched – Part 2
Post by: HCK on July 08, 2013, 11:01:08 pm
How Malware is Researched – Part 2
      


There are lots of useful ways of looking at a file to determine whether it’s malware, and if it is, what it’s trying to do. Some of those ways involve dissecting the file on disk for clues to a file’s structure (static analysis), and some of those ways involve watching the file in action (dynamically) [...]
      

http://www.intego.com/mac-security-blog/how-malware-is-researched-part-2/