where a hash or pattern-based signature is used to identify files or other components that are viruses
not as useful by itself, attackers can use polymorphism, data encryption and/or packing to make detection harder
1 min read
where a hash or pattern-based signature is used to identify files or other components that are viruses
not as useful by itself, attackers can use polymorphism, data encryption and/or packing to make detection harder