Further reading
The following bullets provide you with some additional reading that you may find useful to advance your understanding of the materials in this chapter:
- See the method used to classify various kinds of malware: Rules for classifying (https://encyclopedia.kaspersky.com/knowledge/rules-for-classifying/)
- Locate potential malware dataset sources: Top 7 malware sample databases and datasets for research and training (https://resources.infosecinstitute.com/topic/top-7-malware-sample-databases-and-datasets-for-research-and-training/)
- Discover techniques for discovering behavior tracking spyware: Behavior-based Spyware Detection (https://sites.cs.ucsb.edu/~chris/research/doc/usenix06_spyware.pdf)
- Learn how combined attacks are becoming significantly more common and some of them also thwart MFA: This Android banking malware now also infects your smartphone with ransomware (https://www.zdnet.com/article/this-android-banking-trojan-malware-can-now-also-infect...