Microsoft Malware Protection Center

Threat Research & Response Blog

Browse by Tags

  • Blog Post: Prehistoric Virtual Machines

    When people in the industry talk about intentional obfuscation using virtual machines, (note that these are not the same virtual machines as Virtual PC or VMware, but rather it's a technical term that was in use long before these products came into existence), the two examples that are most likely to...