9 Security Trends To Keep An Eye On


Time-Released Malware

Custom malware will fingerprint systems to see if malware has been dropped on the system during a previous attack. It will look for signs that a virtual machine is running and check for software debuggers and other tools that may signal that the system is a honeypot designed to catch threats for a security vendor. Malware can sit dormant on systems for six months before it attempts to communicate with a remote command and control server, Pirc said. Incident response teams must be able to respond to infected systems and remove malware, even if it hasn't executed, he said.