malware analysis
This note was published in May 2014. A newer revision of the REMnux distro has been released since then. Please see the...Read more
If you are looking to get started with malware analysis, tune into the webcast series I recorded to illustrate key tools...Read more
Examining malicious software involves a variety of tasks, some simpler than others. These efforts can be grouped into...Read more
I was one of the guests at the recent Forensic Lunch discussion, led by David Cowen. Here’s the video recording of the...Read more
Despite its age, Windows XP is useful to have in your IT lab, for instance if you need to experiment with older software or...Read more
Over the years, the set of skills needed to analyze malware has been expanding. After all, software is becoming more...Read more
Sometimes people ask me for career advice related to information security in general and, more specifically, digital...Read more
In the past weeks I published several posts describing malware analysis tools and approaches at other blogs: Installing...Read more
In the field of IT in general and digital forensics in particular, you become obsolete the moment you stop learning. Here...Read more
This note was published in April 2013. A newer revision of the REMnux distro has been released since then.I’m pleased...Read more