Check Point unveils encyclopaedia to explain techniques used by malware to detect virtual environment
A virtual environment differs from common host systems in terms of registry keys, non-common files, and system objects

Cyber security research firm Check Point has launched a new encyclopaedia that lists all techniques used by malware to ascertain if it is running under a virtual environment. The malware evasion encyclopaedia...
More on Security Technology
Mozilla's new Firefox feature blocks cross-site cookie tracking
Total Cookie Protection creates a separate 'cookie jar' for each website, preventing users from being tracked across the web
Use AI to establish normal in abnormal times
Is AI the security solution cloud workloads need?
SolarWinds shows why we need to move beyond passwords
Mission-critical assets require a deeper level of MFA beyond the usual what you know, what you have, and especially the what you are
Delta: Microsoft's identity management lead is under threat
Identity management underwent dramatic changes following the coronavirus pandemic - including the leading vendors' positions
Understanding the shared responsibility model for security in the hybrid cloud
If the responsibilities of CSP and customers are not well understood, the risks to security are obvious