Highest Rated Comments


tamyahuNe25 karma

I laff badge of shame! You should come and look .. it .. at it

Do you plan to visit other post-Soviet countries apart from Prague?

tamyahuNe22 karma

Hi,

1) I would like to ask, if you are working on the prevention against Intel AMT rootkits that reside outside of the operating system, inside of the firmware of the hardware in a computer. Is there any prevention against such attacks?

An example of such rootkit was presented in this talk:

Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware [30c3]

2) How much did polymorphic malware evolve since the early beginnings? Is it much harder to detect such malware today? What kind of techniques does such malware use?

3) Could you comment on the Project Zero findings of the problems with unpacking of the executables?

Thank you.

PS: I love reading your malware reports and your work in general <3