Right... Again I am not talking about activation or deployment... The point is FOR the malware to be found. THAT is the attack. The reflexive response. I don't care about embedded data, steganographic or otherwise. You literally CAN'T put contiguous bytes together to trip Malware detectors now because of the PUSHDATA limit (unless Side-channeled obvsly).
Login to reply
Replies (3)
It's fairly easy to evade existing malware signature detection. It's whackamole.
This misses my point.
Speak plainly. What's the point?