How to Deal with Malware

With this brief tutorial, here at UIC we are going to open a new Reversing Chapter that follows the new challenge promptly emerged in the last years: Malware Reverse Engineering. This field is quite interesting and important for every serious RCE Community mostly because we are now facing an impressive boost of Malicious Executables and […]