Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Worms Security IT

Inside The First Pocket PC Trojan 8

fogez writes "This tutorial shows you how to reverse engineer a new example of Windows Mobile malware - step by step. Included are methods for background research and even include a fully annotated IDA disassembly of the ARM binary. We hope that this tutorial will inspire others to enter the exciting field of reverse engineering embedded malware."
This discussion has been archived. No new comments can be posted.

Inside The First Pocket PC Trojan

Comments Filter:

"When anyone says `theoretically,' they really mean `not really.'" -- David Parnas

Working...