Check Point unveils encyclopaedia to explain techniques used by malware to detect virtual environment

clock • 2 min read

A virtual environment differs from common host systems in terms of registry keys, non-common files, and system objects

Cyber security research firm Check Point has launched a new encyclopaedia that lists all techniques used by malware to ascertain if it is running under a virtual environment. The malware evasion...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Check Point releases emergency fix for VPN zero-day

Threats and Risks

Patches actively exploited flaw

clock 30 May 2024 • 2 min read
TP-Link routers provide entry point for Chinese hackers

Threats and Risks

Malicious firmware being used to build chain of devices to snoop on European government entities, says Check Point

clock 17 May 2023 • 2 min read
Cull of cybersecurity startups likely due to faltering economy

Security

There are just way too many of them

clock 29 March 2023 • 4 min read
Most read
01

Ransomware targets London branch of China's ICBC

13 September 2024 • 2 min read
02

Teen arrested over TfL cyberattack

13 September 2024 • 3 min read
03
04

Avis notifies customers of data breach

10 September 2024 • 3 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security Technology

Saving face: Five key considerations when navigating the use of facial recognition technology

Saving face: Five key considerations when navigating the use of facial recognition technology

Facial recognition brings legal and reputational risks

Ashley Avery, Paolo Sbuttoni and Rachel Griffith
clock 03 September 2024 • 3 min read
SSO is dead: Why the age of zero trust demands secure explicit sign-on

SSO is dead: Why the age of zero trust demands secure explicit sign-on

Single sign-on's cons now outweigh the pros

Al Lakhani
clock 03 September 2024 • 5 min read
Microsoft mandates multi-factor authentication for Azure sign-in

Microsoft mandates multi-factor authentication for Azure sign-in

MFA requirement will be implemented in stages

clock 20 August 2024 • 3 min read