Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Worms Security IT

Inside The First Pocket PC Trojan 8

fogez writes "This tutorial shows you how to reverse engineer a new example of Windows Mobile malware - step by step. Included are methods for background research and even include a fully annotated IDA disassembly of the ARM binary. We hope that this tutorial will inspire others to enter the exciting field of reverse engineering embedded malware."
This discussion has been archived. No new comments can be posted.

Inside The First Pocket PC Trojan

Comments Filter:

Always draw your curves, then plot your reading.

Working...