Tag: pomnocup
-
VB2014 preview: Duping the machine – malware strategies, post sandbox detection
James Wyke looks at four difference decoy methods. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that will be presented at the event. Today, we look at the paper ‘ Duping the machine – malware strategies, post sandbox detection ‘, from Sophos…