Many malware attacks are so sophisticated, that they even include protective capabilities for source code to ensure it is not used by other authors.  These techniques also create difficulties for security vendors as they attempt to research the underlying functionality of malware. Malware Writers – Using Copy Protection Techniques QUOTE: Malware writers are lifting […]