Articles on Malware
- Tools Analyze Memory of an Infected System With Mandiant's Redline Mandiant's free Redline tool triages potentially compromised hosts through live memory analysis, replacing Audit Viewer. It uses Memoryze to capture memory, assigns Malware Risk Index scores using...
- Assessments Security Assessment Testing for Client-Side Vulnerabilities Client-side penetration testing mimics real attacks by targeting unpatched desktop software via malicious emails or websites. Three approaches offer increasing intrusiveness: tracking link clicks to...
- Tools Remotely Find Outdated Adobe Reader With HBGary AcroScrub HBGary's free AcroScrub utility remotely scans Windows hosts via WMI to find outdated Adobe Reader installations. During malware outbreaks exploiting Reader vulnerabilities, such lightweight...
- Malware Fear vs. Anxiety in Cybersecurity: What We Can Do Fear involves specific threats that can be addressed through threat modeling, while anxiety is a diffuse reaction to abstract concerns that's harder to resolve. Much security FUD induces anxiety...
- Malware Free Online Tools for Examining Suspicious PDFs Free online tools automate suspicious PDF analysis without local installation: QuickSand for manual structure exploration, Jsunpack and Wepawet for JavaScript deobfuscation, and Gallus for exploit...
- Incident Response Making Sense of Digital Forensics and Incident Response Disciplines Digital forensics encompasses examining artifacts in databases, memory, network traffic, and mobile devices beyond traditional hard drive analysis. Incident response complements forensics with...