Analysis of Malicious Documents-Part 2

In the previous part of this article series, we have seen some basics and initial concepts around analyzing Malicious files. In this part of article series, we will consider more complex examples and…

Go on to the site to read the full article

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by LM Security. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/zv4QwkWZ8uI/