Check Point unveils encyclopaedia to explain techniques used by malware to detect virtual environment

clock
Malware evasion encyclopaedia launched by Check Point Research
Image:

Malware evasion encyclopaedia launched by Check Point Research

A virtual environment differs from common host systems in terms of registry keys, non-common files, and system objects

Cyber security research firm Check Point has launched a new encyclopaedia that lists all techniques used by malware to ascertain if it is running under a virtual environment. The malware evasion encyclopaedia...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

More on Hardware

Legacy technology turning leaders to laggards

Legacy technology turning leaders to laggards

The legacy model is incompatible with the fast-paced, on-demand modern world, argues Callum Rimmer, co-founder and CEO, By Bits

Callum Rimmer
clock 11 November 2021 • 5 min read
Sir Clive Sinclair dies at 81

Sir Clive Sinclair dies at 81

Home computing pioneer leaves a legacy of groundbreaking inventions

John Leonard
clock 17 September 2021 • 3 min read
Only one in four IT leaders say their company's e-waste policies are 'robust'

Only one in four IT leaders say their company's e-waste policies are 'robust'

E-waste contains toxic materials like lead, mercury and cadmium

clock 27 August 2021 • 2 min read