Forensic characteristics of creation, use and distribution of malicious computer programs
Malicious software and viral phishing attacks have remained for several consecutive years among the most effective tools for infiltrating information infrastructure. In the vast majority of cases, the exploitation of malicious software is associated with gaining access to systems containing confidential information and its theft, which constitutes the least costly method for delivering and executing malicious code on a recipient’s device. Given that the increase in unlawful acts related to the creation...