Malware developers are always looking for new technics to bypass security systems. In this article we will see how Windows Installer can be abused to deliver malicious code, and how the famous ransomware Maze uses this type of technic. Create malicious MSI files An MSI file is a compressed database [...]
Today there are a very large number of types of point protection solutions. This large number does not facilitate the choice of its protection solution, especially since each of these solutions has very specific functionalities. It is however important to make this choice in conscience but also in knowledge. This is why it is wise to know the protection solutions present on the market, their mode of operation, their advantages but also their limits.