Early malware had specific behaviours and signatures that could be used to track them. These were very characteristic of each of them. For example, the Melissa Virus of 1999 was usually delivered via an email attachment and only invoked when a user opened the attached .doc file. It spread quickly due to mass emailing and …
Continue reading "Shapeshifting threats: Polymorphic & Metamorphic Malware"
