#WebScene

#The biggest in small world

Bad-ware analyze tutorial

TDL4 Starts Using 0-Day Vulnerability

# TDL4 Starts Using 0-Day Vulnerability

The Evolution of TDL: Conquering x64 Eugene Rodionov, Malware Researcher Aleksandr Matrosov, Senior Malware Researcher ##...

Pearson Rootkits infiltration du noyau Windows

# Pearson Rootkits infiltration du noyau Windows

...

Adobe Flash Malware

# Adobe Flash Malware

Analysing of an Adobe Flash Malware by NCR...

The Art of Computer Virus Research and Defense

# The Art of Computer Virus Research and Defense

Peter Szor takes you behind the scenes of anti-virus research, showing howthey are analyzed, how they spread, and~~most importan...

Malware Detection  Advances in Information Securit

# Malware Detection Advances in Information Securit

This book captures the state of the art research in the area of malicious code detection, prevention and mitigation. It contains...

Rootkits : Subverting the Windows Kernel

# Rootkits : Subverting the Windows Kernel

This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrator...

Malware: Fighting Malicious Code

# Malware: Fighting Malicious Code

This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mai...

Identifying Malicious Code Through Reverse Enginee

# Identifying Malicious Code Through Reverse Enginee

Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. T...

Malware Analyst's Cookbook

# Malware Analyst's Cookbook

A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on comput...

Practical Malware Analysis

# Practical Malware Analysis

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act qu...

Cuckoo Malware Analysis

# Cuckoo Malware Analysis

What this book covers Chapter 1, Getting Started with Automated Malware Analysis using Cuckoo Sandbox, gets you started with t...