[ Date Index ] [ Thread Index ] [ <= Previous by date / thread ] [ Next by date / thread => ]
On 11/03/14 10:43, Brad Rogers wrote: > > It's almost a certainty that the payload will only run in a Windows > environment. The days of this being true are gone. Sure most malware is Windows specific, but malware authors are venturing out into the big brave world of Unix (Mac OS X) and GNU/Linux. The targeted malware tool of choice is Java, since it is nicely portable. Remove client side Java where possible. I think the main use outside malware and borked websites, is Eclipse. You can always shuffle it out of the default path, and set the path for Eclipse, if you use Eclipse. Really for the non-professional leave malware alone. Even if you avoid the intended payload you may still do things that make you potentially vulnerable like visit URLs. If you make your living dealing with malware you'll have air-gapped or other environments in which to play safely. If you need to know what something is you can feed it to tools like Virus total, or your anti-malware provider of choice will tell you. If you work in a big organisation they likely have a policy on what to do.
Attachment:
signature.asc
Description: OpenPGP digital signature
-- The Mailing List for the Devon & Cornwall LUG http://mailman.dclug.org.uk/listinfo/list FAQ: http://www.dcglug.org.uk/listfaq