{"id":6866,"date":"2021-12-16T07:19:20","date_gmt":"2021-12-16T06:19:20","guid":{"rendered":"https:\/\/immune.institute\/?p=6866"},"modified":"2021-12-16T07:19:20","modified_gmt":"2021-12-16T06:19:20","slug":"reversing-de-malware-bases-ciberseguridad","status":"publish","type":"post","link":"https:\/\/immune.institute\/en\/blog\/reversing-de-malware-bases-ciberseguridad\/","title":{"rendered":"Reversing malware, one of the foundations of cybersecurity"},"content":{"rendered":"<p><b>Malware attacks on institutions and individuals are multiplying.<\/b><span style=\"font-weight: 400;\"> Cyber-attacks carried out by different types of hackers seeking various purposes (espionage, money, their own amusement, etc.).<\/span><\/p>\n<blockquote>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Cyber risks are a reality in society and therefore it is necessary to know how to combat them.\u00a0\u00a0<\/span><\/p>\n<\/blockquote>\n<p><span style=\"font-weight: 400;\">But first of all, do you have a clear picture of the <\/span><b>the definition of malware<\/b><span style=\"font-weight: 400;\">? Before delving into malware reversing, one of the foundations of cybersecurity, it is necessary to have a good understanding of this term.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">To begin with, what is malware in computing?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Because maybe you've heard of \"malware\" many times, but you don't know it for sure. Even if you do, it's never a bad thing to brush up on the concepts:<\/span><\/p>\n<blockquote>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Malware or malicious software defines any type of computer code or programme, which is created ad hoc to damage, invade or control an electronic device, network or computer system.<\/span><\/p>\n<\/blockquote>\n<p><span style=\"font-weight: 400;\">That is to say that <\/span><b>within the same malware we will not only find the famous computer viruses<\/b><span style=\"font-weight: 400;\">but also other types such as Trojans, worms, malicious cookies and others.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is worth noting that in order to find out how a particular malware works, <\/span><b>it is necessary to keep in mind the type of operating system<\/b><span style=\"font-weight: 400;\">Windows (the vast majority of malware is of this type), Linux... And, of course, mobile systems such as Android.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What is malware reversing, one of the foundations of cybersecurity?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">So why do we say that malware reversing is one of the foundations of cybersecurity? Here is its definition:<\/span><\/p>\n<blockquote>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Malware reversing encompasses the study of malicious code in order to know and identify the vulnerabilities used to infect a system, the attack vectors and the level of infection. All of this is done in order to create and implement protection measures.<\/span><\/p>\n<\/blockquote>\n<p><span style=\"font-weight: 400;\">In this way, <\/span><b>Malware reversing has become one of the key methodologies in computer security.<\/b><span style=\"font-weight: 400;\">It can combat all types of malware whose origin is unknown. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">And, although the <\/span><i><span style=\"font-weight: 400;\">modus operandi<\/span><\/i><span style=\"font-weight: 400;\"> is similar to reverse engineering, these terms should not be confused.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What is the definition of reverse engineering?<\/span><\/h2>\n<p><b>Reversing malware, one of the foundations of cyber security, is not the same as reverse engineering.<\/b><span style=\"font-weight: 400;\"> Although it is true that both are very new and effective techniques.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To begin with, reverse engineering is that branch of engineering which <\/span><b>studies the performance of a product<\/b><span style=\"font-weight: 400;\">The aim is to replicate it and thus to analyse and understand its possible failures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, in a way, <\/span><b>Reversing malware is reverse-engineering when you reverse-engineer it.<\/b><span style=\"font-weight: 400;\">. Because malicious code is being studied in order to understand it and implement cybersecurity measures.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Sandbox in IT security: another concept to take into account<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Another term to take into account in order to understand what malware reversing is, is the <\/span><b>Sandbox in IT<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<blockquote>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Sandboxes define a series of cybersecurity mechanisms that isolate malware-infected software from the rest of the system. All this, so that the malware does not spread throughout the system.<\/span><\/p>\n<\/blockquote>\n<p><span style=\"font-weight: 400;\">In this way, just like children's sandboxes, cybersecurity professionals develop these controlled environments. And you, are you interested in <\/span><a href=\"https:\/\/immune.institute\/en\/que-se-necesita-para-trabajar-en-ciberseguridad\/\"><span style=\"font-weight: 400;\">cybersecurity<\/span><\/a><span style=\"font-weight: 400;\">? <\/span><b>Have you ever thought of going into IT security?<\/b><\/p>\n<h2><span style=\"font-weight: 400;\">Are you interested in cybersecurity? At IMMUNE you can train in it.<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Indeed, if you want to become a cybersecurity expert and implement measures such as malware reversing or follow IT philosophies like <\/span><a href=\"https:\/\/immune.institute\/en\/devsecops-y-su-importancia-en-la-ciberseguridad\/\"><span style=\"font-weight: 400;\">DevSecops<\/span><\/a><span style=\"font-weight: 400;\">you must have <\/span><b>specialised training in computer security<\/b><span style=\"font-weight: 400;\">. The IMMUNE Institute of Technology can help you with this.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you are thinking of dedicating the <\/span><a href=\"https:\/\/immune.institute\/en\/hacking-etico-que-es-y-que-debo-aprender-para-ello\/\"><span style=\"font-weight: 400;\">ethical hacking<\/span><\/a><span style=\"font-weight: 400;\">We offer a variety of training programmes: our <\/span><a href=\"https:\/\/immune.institute\/en\/programas\/master-online-de-ciberseguridad\/\"><span style=\"font-weight: 400;\">Cybersecurity Master<\/span><\/a><span style=\"font-weight: 400;\"> (also available in <\/span><a href=\"https:\/\/immune.institute\/en\/ciberseguridad-avanzada-online\/\"><span style=\"font-weight: 400;\">online version<\/span><\/a><span style=\"font-weight: 400;\">) and this <\/span><span style=\"font-weight: 400;\">Bootcamp in Secure Coding<\/span><span style=\"font-weight: 400;\">ideal for any IT specialist.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Come to our campus now and choose these studies with multiple job opportunities.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Los ataques de malware hacia entidades y particulares se multiplican. Ciberataques realizados por diferentes tipos de hackers que buscan diversos cometidos (espionaje, dinero, divertimento propio\u2026). Los ciberriesgos son una realidad en la sociedad y, por consiguiente, es necesario saber c\u00f3mo combatirlos.\u00a0\u00a0 Pero, antes de nada, \u00bftienes clara la definici\u00f3n de malware? Antes de profundizar sobre [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":7348,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-6866","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/6866","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/comments?post=6866"}],"version-history":[{"count":0,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/6866\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media\/7348"}],"wp:attachment":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media?parent=6866"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/categories?post=6866"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/tags?post=6866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}