9 Security Trends To Keep An Eye On


Email this CRN article

Time-Released Malware

Custom malware will fingerprint systems to see if malware has been dropped on the system during a previous attack. It will look for signs that a virtual machine is running and check for software debuggers and other tools that may signal that the system is a honeypot designed to catch threats for a security vendor. Malware can sit dormant on systems for six months before it attempts to communicate with a remote command and control server, Pirc said. Incident response teams must be able to respond to infected systems and remove malware, even if it hasn't executed, he said.



Email this CRN article