Windows 10 brings a number of advances and features over previous Windows operating systems. This report details the new technologies and features that are included in Windows Defender in Windows 10.
Macro-based malware uses macros embedded in Microsoft Office files to sneak in further infection. This report includes the following sections:
Rootkits provide stealth capabilities to malware. This report examines how attackers use rootkits, and how rootkits function on affected computers.
This report examines the prevalent EyeStye family of malware.
This report provides an overview of the Win32/Poison (Poison Ivy) family of malware.
This special edition of the SIR provides an overview of the Win32/Rustock family of rootkit-enabled backdoor trojans.
This report provides an overview of the Win32/Qakbot (Qakbot) family of malware.
This document provides an overview of the Win32/Zbot family of password-stealing trojans.
I want to...