Chapter 12. Conclusion

Our malware journey is now drawing to an end. Throughout this book, we've discussed many of the most common and damaging malware attacks we face today, right along with a historical perspective and numerous predictions for future malware evolution. However, information security sure isn't a static field, and the malware threat evolves continuously. Folks in the computer underground are constantly pushing the envelope, devising new tools and techniques for attacks. Similarly, in the defensive community, we continuously improve our capabilities, with refinements in processes and updates to our technologies. Sometimes, you just can't help but feel like a minnow swimming upstream against a tidal wave of new information. Keeping ...

Get Malware: Fighting Malicious Code now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.