<div dir="ltr"><div>"Before companies like Microsoft and Apple release new software, the code is reviewed and tested to ensure it works as planned and to find any bugs.<br><br>Hackers and cybercrooks do the same. The last thing you want if you’re a cyberthug is for your banking Trojan to crash a victim’s system and be exposed. More importantly, you don’t want your victim’s antivirus engine to detect the malicious tool.<br>
<br>So how do you maintain your stealth? You submit your code to Google’s VirusTotal site and let it do the testing for you..."</div><div><br></div><div><a href="http://www.wired.com/2014/09/how-hackers-use-virustotal/">http://www.wired.com/2014/09/how-hackers-use-virustotal/</a><br>
</div><div><br></div>-- <br><div dir="ltr"><div><br></div><div>Mark Kelly</div><div>mark AT vceit DOT com</div><div><a href="http://vceit.com" target="_blank">http://vceit.com</a></div><div><br></div><div><div><i>"Due to recent advances in DNA analysis, I will no longer be spitting in your coffee." </i>Anon</div>
</div><div><br></div><div><br></div></div>
</div>