Analysis of Malicious Documents-Part 1

Spreading of malware through malicious documents is not new but considering how malware authors use different techniques has become challenging for malware analysts to identify the patterns, extract,…

Go on to the site to read the full article

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by LM Security. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/E5A07GIUZQo/