Some software components are innocent victims of other component coding mistakes or deliberate subversion and some start as a part of crimeware and malware but eventually become victims themselves (they crash, hang, spike, leak, are dumped, subverted, etc). Learn about unified malware and victimware analysis by using behavioral and structural patterns including a live memory dump analysis example.
Date: 16th of July, 2012
Time: 17:00 (BST) 12:00 (EST) 09:00 (PST)
Duration: 45 minutes
Space is limited.
Reserve your Webinar seat now at: