Check Point unveils encyclopaedia to explain techniques used by malware to detect virtual environment

clock • 2 min read

A virtual environment differs from common host systems in terms of registry keys, non-common files, and system objects

Cyber security research firm Check Point has launched a new encyclopaedia that lists all techniques used by malware to ascertain if it is running under a virtual environment. The malware evasion...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
TP-Link routers provide entry point for Chinese hackers

Threats and Risks

Malicious firmware being used to build chain of devices to snoop on European government entities, says Check Point

clock 17 May 2023 • 2 min read
Cull of cybersecurity startups likely due to faltering economy

Security

There are just way too many of them

clock 29 March 2023 • 4 min read
Locking it down: Top 10 zero trust vendors deployed by UK IT teams

Security Technology

The zero trust approach to cybersecurity leapt up the agenda when the pandemic hit. Here's an overview of some of the key industry players

clock 30 June 2022 • 11 min read
Most read
01

Cabinet Office terminates £9m Microsoft deal

16 February 2024 • 2 min read
03

Microsoft announces critical zero-day Exchange bug

16 February 2024 • 1 min read
05

Cisco cuts more than 4,000 jobs

15 February 2024 • 3 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security Technology

UK's biometrics commissioners steps down, signalling missteps

UK's biometrics commissioners steps down, signalling missteps

Home Office is ignoring new technologies

Muskan Arora
clock 31 January 2024 • 4 min read
Endpoint is the path of least resistance, says Threatlocker

Endpoint is the path of least resistance, says Threatlocker

IT Leaders Summit debates the true purpose of endpoint security.

Penny Horwood
clock 05 October 2023 • 2 min read
GitHub announces passwordless authentication trial

GitHub announces passwordless authentication trial

The trial can be considered a milestone in the long demise of passwords

Penny Horwood
clock 13 July 2023 • 2 min read