Never too much information when it comes to the latest emerging IT threats. This important update is provided by IT Business Edge, a great source for the information, analysis, and context that business technology decision makers need to devise strategies and optimize resources.
USING DRM-LIKE TECH TO HIDE VIRUSES
Some music and ebook files are protected by digital rights management (DRM) systems. These files are effectively locked to particular devices so that they can only be played on those devices and can’t be copied and shared.
Malware can use the same technique. Essentially it locks itself to a particular system by encrypting portions of its binary using specific attributes of the infected system to generate a key. [Read more…]