205 articles

A Disembodied Threat

One of the most sophisticated mechanisms malware uses to stay below security systems’ radars is having no detectable file body. Malware creators use various techniques to accomplish that. Perhaps the most insidious of which is the execution of the malicious code wholly within the machine’s volatile memory.

Malware evolution is something that may make individual users and businesses more likely to become victims of cyberattacks.

Cybercrime International, Ltd.

As the criminals join forces “intercontinentally” to improve their crimeware together, businesses and LEAs should work together as well. Cybersecurity is everybody’s business – today more, perhaps, than ever.