malicious behavior Tag

Freely available, public networks are a huge asset to the world, and they get plenty of use. One global supplier of software for public networks, Purple Wi-Fi, reports that almost half of us who carry a laptop, tablet, or smart phone, will connect to a...

At Lastline we take great pride in our partnerships and ability to integrate with other security tools. For example, with more than 90 percent of data breaches attributed to phishing schemes, our partnership with PhishMe provides a critical degree of added protection against such attacks. Lastline...

In a previous blog, titled Evasive Malware – The Art of Doing Nothing, we covered how advanced malware evades detection by stalling and postponing all malicious activity whenever a sandbox is detected.  In today's blog, we'll look at another sophisticated evasion technique...

Most malware detection systems identify malicious code by monitoring its execution in a sandbox environment to detect anomalous behavior. As the malware runs, the sandbox searches for signs of odd or unauthorized actions like: Elevating privileges to "administrator" or "root" when the program doesn't ordinarily...