Categories
IT Security Outsourced IT

Dropper Malware

What is Dropper Malware? Droppers are a type of Trojan that installs other malware once it is present in a system. They are named droppers because they ‘drop’ malware and malware components into an already-compromised system. A dropper’s payload often contains more Trojans. Some droppers contain a single malicious program, but many contain multiple malware […]

Categories
IT Security Outsourced IT

Artificial Neural Networks

What are Artificial Neural Networks? Artificial neural networks (ANNs) are a subset of machine learning and are at the core of deep learning algorithms. The structure and name are inspired by the way that biological neurons signal to one another in the human brain. ANNs are comprised of node (artificial neuron) layers that contain an […]

Categories
Application Security IT Security Outsourced IT

Heuristic Analysis

What is Heuristic Analysis? The term “heuristic virus” is a nickname for a malware called Heur.Invader. Heur.Invader malware can disable antivirus software, modify security settings, and install additional malicious software onto a computer. Adware and Trojans are examples of heuristic viruses. Heuristic analysis refers to the methods employed by antivirus programs designed to detect previously […]