Malicious Obfuscated Code Evolution


Author: JT Smith

Finjan discovered examples of obfuscated code embedded in rich-content files, and not only in HTML-webpages on legitimate websites. Code obfuscation remains the preferred technique for cybercriminals for their attacks. Real-time content inspection is the optimal way to detect and block dynamically obfuscated code and similar types of advanced cybercrime techniques, since it analyzes and understands the code embedded within web content or files in real time – before it reaches the end-users.



  • Internet & WWW