Roughly a third of malware sent to a virtualized environment for analysis is able to elude detection, a security expert says.
Security vendors sell virtualized appliances to run and analyze the behavior of suspicious applications to identify malware, determine how it entered a network and then plug vulnerabilities. Over the last few years this technology has been used, cyber criminals have found ways to make their malware appear benign in such environments.
"Overall, there are so many ways malware can uncover it is inside a virtual environment that it is practically impossible
- The Language of UX: Beyond Buzzwords -
- I Can See Clearly Now - E2 Conference Boston
- Learn how to enage customers through mobility - Mobile Commerce World - Mobile Commerce World
- The E2 Social Business Leaders - E2 Conference Boston - E2 Conference Boston
- The A-to-Z of Building Your Big Data Initiative - E2 Conference Boston - E2 Conference Boston
- Building a Hybrid Cloud in Government: It's not that Complicated
- The Best Mobile Apps are Connected
- The Critical Importance of High Performance Data Integration for Big Data Analytics
- Mobile DevOps: Achieving continuous delivery with multiple front ends and complex backends in Banking, Financial Services, and Insurance
- Get Actionable Insight with Security Intelligence for Mainframe Environments