September 23, 2008
Malicious Obfuscated Code Evolution
Author: JT Smith
Finjan discovered examples of obfuscated code embedded in rich-content files, and not only in HTML-webpages on legitimate websites. Code obfuscation remains the preferred technique for cybercriminals for their attacks. Real-time content inspection is the optimal way to detect and block dynamically obfuscated code and similar types of advanced cybercrime techniques, since it analyzes and understands the code embedded within web content or files in real time - before it reaches the end-users.
- Internet & WWW