Provided by: SecurityTube.net
Date Added: Jan 2014
In this podcast, the speaker explains about malware analysis. The extraction of runtime behavior of malicious code to understand: how it works, how to identify it, how to defeat or eliminate it. The value is supply signatures (IOCs) to detect systems and provide evidence for recovery and cleanup.