Monday, December 30, 2019

Super Heroes in the Epic of Gilgamesh - 676 Words

The Super two Heroes Epics have been around for centuries until this present time and considered typically from oral tradition, narrating the deeds and adventure of legendary figures. Forever it will be until the end of the world. Because one key concept of an epic is the presence of a hero and yet they are able to withstand all the trials and challenges they may go through. Who will convince the gods on your behalf that you may find the life you are seeking? Love as a motivating force, the inevitable of death and the gods are also dangerous if you fall into victim. The epic of Gilgamesh is one of the earliest pieces of poem written on twelve different clay tables which remained one of the most prominent stories in world today. Number of this poetry wrote about Gilgamesh present him as a ruler of his people in Uruk which is called today Iraq. â€Å"The priest will bless the young couple, the guests will rejoice, the bridegroom will step aside, and the virgin will wait in the marriage bed for Gilgamesh, the king of great-walled Uruk.† Gilgamesh a king whose desire is to sleep with the virgins and treat people so badly provoked the gods to fulfill the wish of the people by creating Enkidu who possess supernatural strength to fight Gilgamesh. Within a period of time Gilgamesh and Enkidu united to become more than friends. They took upon themselves hazardous task and killed the monster Humbaba which Gilgamesh purposely chose to slay simply for the glory of it. Later,Show MoreRelated Comparing the Hero in Epic of Gilgamesh and Homers Iliad Ess ay730 Words   |  3 PagesThe Hero in Epic of Gilgamesh and the Iliad    One and the same lot for the man who hangs back and the man who battles hard. The same honor waits for the coward and the brave. They both go down to Death, the fighter who shirks, the one who works to exhaustion. (IX,385-88) Thus muses Achilles, one of epic poetrys greatest heroes. Epic poetry, one of the earliest forms of literature, began as an oral narration describing a series of mythical or historic events. EventuallyRead MoreEpic Of Gilgamesh : The Epic Hero1641 Words   |  7 PagesGilgamesh is an ancient Mesopotamian hero, featured in the famous tale of â€Å"The Epic of Gilgamesh†, who embarks on a perilous quest for immortality. This idea, â€Å"†¦touches on the most fundamental questions of what it actually means to be human†¦Ã¢â‚¬  (Homer 33), and gives us light into the minds of the people during the era. Gilgamesh’s tale gives us a glimpse at how the people of that day viewed a â€Å"hero†, and allows us to reflect upon what we consider a â€Å"hero† today. Using the Epic Hero Cycle, I will analyzeRead MoreThe Epic Of Epic Heroes2181 Words   |  9 Pagesthe traits of epic heroes represent an integral part of ancient literature. In fact, wha t would literature be without epic heroes? How different would The Odyssey be if Odysseus never went on his epic journey? Would the epic poem Beowulf still be read today if the character Beowulf never challenged Grendel and Grendel’s mother? In the story, The Epic of Gilgamesh, characters, both men and women, exhibit characteristics that could be considered heroic, but do they represent epic heroes? Applying a characterRead More The Transcending Characteristics of a Mythical Hero Essay1520 Words   |  7 Pagesthe Sumerians, predecessors of the Persians, there exists a startling parallelism in imagery and themes of the myths of the respective peoples. The epics of Heracles and Gilgamesh are an exceptionally good example of these similarities. nbsp;nbsp;nbsp;nbsp;nbsp;One cannot know with a certainty whether the original creator of the epic of Gilgamesh, whose name is lost in time, or Shin-eqi-unninni, the scribe with whose version we are familiar today, knew anything of the legend of Heracles. HoweverRead MoreCharacteristics Of Gilgamesh1021 Words   |  5 Pages A hero can be anyone. A hero does not have to be a super hero that is on TV or in the movies. A hero can be anyone who is admired for his or her courage and outstanding achievements. A hero can be a parent, a family member, a friend, or even a doctor. A hero is a person who comes into another persons life to help and encourage the other person. The hero can have a significant effect on any person. They could have helped a person when he or she was having a hard time or they saved them from an accidentRead MoreSimilarities Between The Monkey King And Gilgamesh1536 Words   |  7 Pagesglobe. Gilgamesh and the Monkey King are two different stories from different background settings and they are in one way or the other similar and at the same time they have distinctive features as the narrators try to put across their points to the readers of these stories. This essay will examine some of the things which are common between the Handsome Monkey King and Gilgamesh. In addition to, this essay will try to explain the reasons which are making these two characters untypical heroes. TypicallyRead MoreComparing The Epics And The Epic Heroes2376 Words   |  10 PagesComparison of the Epics In every epic, there are common themes that present themselves throughout the story, such as war. The epics Gilgamesh, Beowulf, and The Mahabharata, share similar characteristics in terms of their strength, values, and journeys. In each of the epics that will be discussed, there is the occurrence of fighting for honor and to have a legacy. The epic heroes follow many of the guidelines that Joseph Campbell has written in his book Hero with a Thousand Faces. Joseph CampbellRead MoreThe Dark is Rising Series1373 Words   |  6 PagesIn every epic journey there are a series of events which the hero must go through if he is to become the ultimate hero. One of the most important parts in the epic journey is the descent into darkness or hell. Hell is a place where the hero travels to a dark place to learn about himself or to find very key information about his quest. However there is one common theme. The theme is the hero learns some valuable lessons. He or she learns how the underworld helps him to achieve the symbolic death andRead MoreAnalysis Of Beowulf As A Heroic Epic779 Words   |  4 Pageshero is somebody who voluntarily walks into the unknown†. Stories about such heroes have been told for centuries. In fact, heroistic ideals are sometimes the basis of a society. The Anglo-Saxon people are a prime example of the previous statement. In Anglo-Saxon culture, being called a hero was an honor. Heroes were treated like kings. One of the most popular hero stories that bled into Anglo-Saxon life was the heroic epic of Beowulf. Beowulf was the perfect example of an Anglo-Saxon hero as he wasRead MoreThe Epic Of Gilgamesh And The Iliad2165 Words   |  9 PagesInstructors’ Name Course Name Date Gilgamesh and Achilles as Portrayed in the Writings â€Å"Epic of Gilgamesh† and â€Å"The Iliad† â€Å"Epic of Gilgamesh† and â€Å"The Iliad† presented conflict between the ancient kings, the gods, and finest warriors with other ordinary community members. Throughout the writings Gilgamesh, the king of Uru Community, and Achilles, one of the greatest Greek warriors, struggled to resolve the conflicts between the gods and their community members. However, Gilgamesh misused his powers to a point

Sunday, December 22, 2019

The Road Through The Wall By Shirley Jackson - 1897 Words

Shirley Jackson was born in San Francisco, California on December 14th 1916. From an early age she was at odds with her parents expectations. Within these expectations her mother had an obsession with appearance that put her further away from her. Jackson began writing in 1930 as a teenager and grew up in a suburban atmosphere; this later became the subject of her first novel â€Å"The Road through the Wall† in 1948. From California she moved cross country to Rochester, New York in 1934. Her university education began at the University of Rochester in 1936 but withdrew that same year. Jackson reentered the following year, 1937, to Syracuse University. This is where her writing blossomed. As an undergraduate her story â€Å"Janice† was published in the Syracuse University magazine in 1938 and the following year won second prize in a poetry contest. Jackson began a literary journey, Spectre, with Stanley Edgar Hyman and was in a romantic relationship with him as well. In 1940, the same year she graduated, with a dual major in English and speech, she married Stanley Hyman. The first of her four children, Laurence, was born in 1942 which is the same time she began to have her stories published. Two years later in 1944, she was chosen for Best American Short Stories for â€Å"Come Dance with Me in Ireland.† A year after her husband acquired a teaching job at Bennington College and they moved to North Benningtown, Vermont, where she continued to write and raise her children. Jackson became aShow MoreRelated Shirley Jacksons The Lottery 946 Words   |  4 PagesShirley Jackson is said to be one of the most â€Å"brilliant and influential authors of the twentieth century.† â€Å"Her fiction writing is some of the most important to come out of the American literary canon.† (http://shirleyjackson.org/Reviews.html) Jackson wrote many short stories and even some books. They are more on the dark, witchlike side, however. Kelleher explains that Jackson stated in some interviews that she practiced magic. No one really knows if she was serious while practicing witchcraftRead MoreEssay about The Life and Literary Works of Shirley Jackson4264 Words   |  18 PagesShirley Jackson was born on December 14, 1919 to Leslie and Geraldine Jackson. Her surroundings were comfortable and friendly. Two years after Shirley was born, her family with her newborn brother moved from San Francisco to Burlingame, California, about thirty miles away. According to her mother, Shirley began to compose verse almost as soon as she could write it (Friedman, 18). As a child, Shirley was interested in sports and literature. In 1930, a year before she attended Burlingame High SchoolRead MoreShirley Jackson Biography Essay1117 Words   |  5 PagesShirley Jackson was born on December 14, 1916 in San Francisco, California. She was the daughter of Leslie Hardie (President of Stecher-Traung Lithograph,Inc.) and Geraldine Bugbee Jackson. Miss Jackson attended the University of Rochester from 1934 to 1936. She graduated with a BA from Syracuse University in 1940. Shortly after graduating, she married Stanley Edgar Hyman, who was a literary critic and was on the faculty of Bennington college.. They moved to Vermont and had four children togetherRead MoreEssay about Symbolism in The Lottery by Shirley Jackson488 Words   |  2 PagesSymbolism in The Lottery by Shirley Jackson Thesis: The short story The Lottery by Shirley Jackson found in Perrines Literature written by Thomas R. Arp is a story full of symbolism. I. Names are used to represent different aspects of the story. a. Mr. Summers is a bright and cheerful man. His attitude, demeanor, and name represent the summer. Mr.Graves name represents what is about to happen. They are sending someone to their grave. These names are obvious as to what they mean. b. MrsRead MoreThe Lottery By Shirley Jackson Analysis1592 Words   |  7 Pages In â€Å"The Lottery,† Shirley Jackson tells the story of a fictional village with a population of about three hundred citizens in America, in which a mysterious event known as â€Å"the lottery† takes place once a year. Jackson tells the story from a third-person objective point of view, meaning the narrator tells the story without knowing or commenting on the inner thought of the characters, which makes the ending so shocking. The lottery as a whole is inhumane and cruel, but the people of the villageRead MoreTo Further Understand The Text One Must Know The Literary1724 Words   |  7 Pagesbecause one may associate the word lottery with being lucky or beneficial but the lottery tradition that takes place in the story is the complete opposite. In order to understand the short story The Lottery, by Shirley Jackson, one must first understand the background of the author. Shirley Jackson was born on December 14, 1916 in San Francisco. She spent most of her childhood in Burlingame, California where she as a teenager begin to write short stories. In 1936 she attended the University of RochesterRead MoreThe Summer People, By Shirley Jackson And Smoke Ghost By Fritz Leiber1649 Words   |  7 Pagesexample from our readings and pick out some sort of â€Å"real world† issue or important thing that I have learned from them. For the sake of time, however, I will focus on â€Å"The Yellow Wallpaper† by Charlotte Perkins Gilman, â€Å"The Summer People† by Shirley Jackson and â€Å"Smoke Ghost† by Fritz Leiber. Each of these stories has succeeded in broadening my horizons and has taught me something important about the world in which we live. Weird fiction stories cover a wide range of important issues incl uding sexismRead MoreUtopia, Dystopia, Two Worlds1630 Words   |  7 Pagesauthors have created stories of about what a perfect, or imperfect, world looks like to them. There are two stories that come to mind that explains the polar opposite of two worlds. One of the stories that will be discussed is â€Å"The Lottery† by Shirley Jackson. The other story will be â€Å"The Ones Who Walk Away from Omelas† by Ursula Le Guinn. As you read both stories, the writers have provide great detail about each world to the point that you will say to yourself â€Å"I do not want to live there† or â€Å"I wouldRead MoreAnalysis Of The Lottery By Shirley Jackson2020 Words   |  9 Pagesboth Joyce Carol Oates and Shirley Jackson managed to craft haunting short stories, whose characters quickly bond to your brain before they are quickly ripped away. â€Å"The Lottery’s† effectiveness leans on subtle character traits and changes—her style, while not as minimal, reminds me of Carver, in that what is left unsaid is nearly as important as her stripped down and dialed back use of character description. Though there is an undercurrent of unease slowly pulsing through â€Å"The Lottery†, it isn’tRead MoreThe Black Religious Community, Gospel ( Christian ) Rap2632 Words   |  11 Pageslike the Beatnik or Hippie of yesteryear and now to include churches. Like those references, many think that this too is a passing fad. So why is Hip-hop’s influence able to both captivate and influence the minds of many in the United States and through out the world. Well, Rap music and its culture speaks and delivers a unique message to the inner being of a person that cannot always be seen. The individual response that is generated from the processing of that message can take many different

Saturday, December 14, 2019

World War One Home Front Free Essays

There were any war plans made such as the Schlemiels Plan; a plan devised to avoid war on two fronts, Germans to defeat France and turn back to Russia with a hammer swing, and plan 17; was the French manipulation plan. Modifications were made to the plans and lead to their eventual failure. There were a number of battles including the Battle of the Manner; where German troops attempted to move towards Paris but were attack as the RE flank was exposed. We will write a custom essay sample on World War One Home Front or any similar topic only for you Order Now There was a gap between the troops and the British troops were able to move into the gap. Leading to Germany having to fight a war on two fronts. There was also the Race to the sea which was the Germans attempt to gain as many ports as possible to allow for the continue of trade. It resulted In the creation of the Western front. The Nature of Trench warfare and Life in Trenches (1 86 Words) Trenches played a huge role in WWW. Features of trenches included, sandbags, ammunition, dugouts, parapet, duckboards, fire steps and barbed wire. Trenches were a complex network and extended across many kilometers with the front line positioned to launch at the enemy. They were constructed In a gig gag structure Communication trenches unconnected each line. They were expected to be temporary at the beginning of the war. The area between allies and Germans was called no man’s land. There was not set distance between the lines. No man’s land had deep craters, mud, heavy rain, artillery bombardment. Weaponry changed throughout the war, machine guns, rifles, grenades, flamethrowers, mortars and gas were used. The battle tactics began as offensive and later changed to defensive. The life In trenches was horrible, there were many rats, mud and diseases that were evident within the trenches. This lead to battle fatigue and shell shock. Many soldiers experiences unhygienic living conditions, Illnesses such as dysentery, trench foot and PITS. 80% of the time solders were bored stuff, 19% of the time frozen stiff and only 1% of the time scared stiff. Attempts to Break the Stalemate (241 Words) There were numerous attempts to break the stalemate. The Battle of Verdure was In Feb. – Novel 1916. â€Å"They shall not pass† Is the saying aligned with It. It Involved generals, Falkland for Germany and Petting for France. It was Germany’s aim to bleed the French white† through a war of attrition. Using heavy artillery bombardment and diphthongs gas. It resulted in an early German advance later re won by France. The failures of Verdure lead to Falkland replaced by Hindering and Ultrasound. Another battle was the Battle of the Some. This was from July – Novo General Hag was involved. The aim being to break through and relieve France at Verdure. They used artillery assaults and creeping barrage tanks. Another battle was the Battle of Packsaddle. This was between July’s – Novo 1917. It is known for the mud. It was also with General Hag. The aim was to gain control of the seaports and draw pressure off France. The use of heavy artillery bombardment. The result was only a small territorial gain and the opportunity to send reserves after a breakthrough at Cambric. There were also attempts made beyond the Western Front, these included places like Galileo. There was the naval blockade, which saw Germany launch its unrestricted submarine warfare and peace movements such as Papal peace note to reduce arms and the women’s peace party. Changing attitudes of German and Allied soldiers to the war (174 Words) Britain at the beginning of the war has overwhelming support and enthusiasm. There was a glorified look on war; excitement of the duty and adventure. Britain had no tradition of conscription and men responded to propaganda such as the Kitcheners army posters well. There was â€Å"fear† that war would only last a short period and be over by Christmas. Britain often demons Germany. However, by 1916, the excitement had disappeared and reality of trenches and the futility of war have a major effect on roofs. The Battle of the Some was a turning point where reality sunk in. Recruitment figures have dropped by the end of 1916 and conscription was introduced. War weariness became a factor. Germany also had a massive and widespread enthusiasm. The German men shared the same motivation as British men. Patriotism, honor, duty, peer pressure, impressing girls and a steady income. However, food shortages lead to havoc and German soldiers developed the same feelings of the disillusionment and war weariness as British men especially with Germany facing starvation in 1917. How to cite World War One Home Front, Essays

Friday, December 6, 2019

Recent Trends in Malware Viruses and Trojan Horses

Question: Discuss about theRecent Trends in Malware for Viruses and Trojan Horses. Answer: Introduction Malware or in other words malicious software can include a large number of hostile or criminal software that can cause various forms of security threats like worms, viruses, Trojan horses, and rootkits. The harm is caused by infiltrating a computer without the awareness of the host. AS technologies a have developed over past few years, malwares have also grown with new threats that are difficult to overcome(M., 2008). Attacks through malware are increasing through social networks, search engines and mobile devices exposing web users to infections. In 2010, over 1 million websites were infected by malware and around 1.5 million advertisements were distributed as observed by Dasient. A protection measure requires the use of an antivirus that not just protects a machine from normal viruses but also from malware threats and spywares. In several cases, an anti-malware produced used along with anti-virus would give better protection to a system using internet(Mills, 2011). Considering the large number of compromises caused by malware attacks, malware can be considered as an important area to explore and understand such that awareness about dangers can be created and appropriate protection measures can be identified and used for combating malware related threats. Thus, this report would explore recent trends in malware threats and explore solutions(Mariotti, 2014). Research Report Challenges As per 2013 Batchelder report, malware made on top of the list of threats faced by websites. Malware attack websites by injecting malicious JavaScripts by exploiting their vulnerabilities. These malware attacks affect organizations in major ways out of which data breach is one of the most prominent and harmful threat. They are updated, encrypted with anti-debugging capabilities added and commercialisation of exploit kits with automation has added complexities to incident detection and tracking of malware activities(Mansour Parrizas, 2014). Malware have become persistent threats to the web ecosystem and layered defences are unable to provide a complete protection due to Advanced Persistent Threats (APT) caused by malware. These malware are mostly targeted to evading the privacy or performing some criminal activities like theft, sabotage or espionage(Dionysopoulou, 2014). With a large number of malware existing today, it becomes a challenge to properly classify them. As on March 6, 2007, there were 30,000 distinct variants of malware that were identified. Initially, this classification was done manually but in recent years, the processes are automated for grouping new viruses. However, this automatic classification poses many challenges mainly due to lack of well-defined notions of multiple malware instances(Li, Liu, Gao, Reiter, 2010). Another major challenge occurs because of lack of awareness about malware attack behaviour in users who open doors for such attacks too often putting their systems to risks. Moreover, internet security technologies that are used by enterprises for protection may not be reared to fight the modern malware techniques leaving their machines vulnerable to attacks(Oltsik, 2013). Technologies Technologies are used for detecting malware such that they could be prevented from getting downloaded to cause harm to systems. Various malware detection techniques that are used today include signature based, anomaly based and specification based methods(Agrawal, Singh, Gour, Kumar, 2014). PAYL is a program that is used for dynamic anomaly based detection. It calculates the expected payload for every system port and creates byte frequency distribution for developing a centroid model. Incoming payloads are compared with this model to identify variations. If the incoming payload is much more than expected payload as per the model, then that is recognized as malicious. Intrusion detection can use data mining techniques for creating malware detection agents that can audit data of incoming connections to identify intrusions. Privacy-invasive software (PIS) like Adware and Spyware can be identified using Forensic Tool Kit (FTK) software. Other malware protection technologies use techniques like Finite State Automata (FSA) approach to detection, process profiling of system calls, Audit trail pattern analysis, Network Analysis of Anomalous Traffic Events (NATE), Fileprint (n-gram) analysis, cross-view diff-based detection and so on(Idika Mathur, 2007). Research Areas Various areas of recent in the malware trends include: Types of malware software like viruses, worms and so on such as ransomware, espionage, crime ware and so on. The techniques used by malware software for evasion such as stalling codes, environmental triggers and so on(Lindorfer, Kolbitsch, Comparetti, 2011) Malware detection techniques used for protection from malware threats Probabilities and impacts of malware attacks on systems including various types of malicious activities that can be performed Malicious behaviour categories including evasion, execution, network, packing, auto start, file and memory attacks. Technologies or techniques that can be used for detecting malware Various types of threats that can be caused to various types of users in the case of malware attack incidences(ESET, 2016) Discussion Summary The report explores two studies conducted by M. Papadaki on Attack Pattern Analysis: Trends in Malware Variant Development and by Shahid Alam on Current Trends and the Future of Metamorphic Malware Detection. Attack Pattern Analysis: Trends in Malware Variant Development This research delved into the practices of development of malware variants such that the insights could be used for developing additional protection layers to deal with these variants. The study was conducted by exploring three popular malware threats including Beagle, Netsky and Mytob. Some malware trends seen between the years 2003 and 2005 were identified including mass mailing worms, threats to confidential data, bots and their variants, and blended threats. The analysis of specific threats revealed that mass mailing worms like Netsky are propagated through emails and folders that are shared over web. In such cases, worms use some advanced social engineering techniques such that lure users into opening files and a malicious code gets executed the moment user previews or views the file. Just like Netsky, Beagle also used same channels for propagation and also peer-to-peer networks at times. The difference was found in the way worms are utilized on attacked website. While Netsky sent the whole malicious code for attack, Beagle sent only part of code that was used for downloading entire malicious code from a website. This makes it easier for security communities to block downloads but at the same time makes users vulnerable in future with spamming. Mytob was the newer worm that incorporated mall mailing as well as botnet functionalities. It uses a basic mass mailing functionality but an advanced level of backdoor entry by connecting to IRC servers to receive commands giving servers access to local systems through web or ftp. The research suggested that, it is not the complexity which poses biggest challenge, but the combination of various techniques that they use for tricking users that can pose danger. Thus, malware detection software need to understand evolution of variants of malware and their incremental development behaviour to develop counter-techniques(M.Papadaki, S.M.Furnell, N.L.Clarke, Bakar, G.Pinkney, 2005). Current Trends and the Future of Metamorphic Malware Detection This research explored trends in malware threats and characteristics of malware detection systems. The paper identified techniques that malware developers use to protect malware software from getting detected by antivirus applications such as packing or compression, polymorphism that involves mutation of static binary code, and metamorphism that involves mutation of dynamic binary code. Various types of metamorphic malware were identified including closed-world malware that can generate newly mutated codes and open-world malwares that can communicate with other websites through internet to update themselves. The report suggested that malware detection can be used as a measure for protection and major types of detection techniques include Opcode-based analysis (OBA) that disassembles binaries to extract opcodes, Control Flow Analysis (CFA) that assesses calling relationships between program functions, and Information Flow Analysis (IFA) that checks changes in propagated values over time. The report also observed future trends that can occur in the malware threat propagation. The research revealed that web and mobile malware are likely to get more sophisticated in future which is why a hybrid protection involving both static and dynamic analysis may be required for protection. With increasing use of Internet-of-Things devices, embedded system threats are also likely to increase and this demands use of newer malware detection and protection techniques to protect systems from sophisticated malwares like Stuxnet. Further, the paper suggested that a distributed malware detection system may be used over cloud to secure communications between various devices and cloud(Alam, Traore, Sogukpinar, 2014). Uncovered Issues The researches recognized the challenge and requirement for understanding malware variations and their developmental techniques but it did not cover the methods that are used by malware creators for disguising users or tricking them into opening or downloading malware such as code signing and modified browser settings(Sagar, 2009). The researchers also did not explore the evasion techniques used by malware currently such as environmental awareness, obfuscation of internal data, timing-based evasion and confusing automated tools. There are over 500 evasive behaviours that can be used in combination for causing malware attacks. How security techniques can be used for detecting these evasive behaviours of malware was not covered in the researches explored. The researchers did not explore latest techniques used by various types of malware like botnets, espionage, ransomware and so on. This could have included an exploration of specific types of malware, their varieties, attack techniques and evolution(OECD, 2008). The researchers did not include insights into how systems can get affected which could be useful in identifying causes that would be used for building awareness in users such that threat exposure could be minimized. Some of the techniques that could have been explored here include drive by downloads that involves downloading of an executable file, piggyback attacks which involves embedding of malware code in an otherwise safe executable file(Peterson, 2006). Lessons Learnt Some lessons about malware and their attack, evasion, detection and impact trends include: The danger is more in the combination of evasion techniques used by malware than in the complexities of attacks because evasion techniques target users who are not educated to handle security threats Malware producers keep coming with variations that older technological solutions would not be able to adapt to and thus, newer technologies and updates may be required to prevent such malware from affecting systems. Use of anti-virus software may not be sufficient for complete protection and a complementing malware detection software may be needed Organizations are not prepared with technological solutions that are capable of managing and preventing threats caused by latest malware There are over 500 evasive behaviour used by malware and the list keeps on increasing making it difficult for security solution providers to keep them updated Because of a huge number of variants of malware, a correct classification of malware becomes difficult as this is mostly done use automated tools that have limited information about the characteristics of malware. Conclusions The report explored recent trends in malware including different types of threats from malware, techniques used for development of malware, strategies used for attacking users and measures used for protection from malware. The paper explored two past researches done in this area to understand the trends and identified research gaps by uncovering issues that were not discussed in the chosen researches. Based on the understanding of malware trends and the research gaps, some lessons that were learned from the exercises on the topic of interest were presented in the end. References Agrawal, M., Singh, H., Gour, N., Kumar, A. (2014). Evaluation on Malware Analysis. International Journal of Computer Science and Information Technologies, 3381-3384. Alam, S., Traore, I., Sogukpinar, I. (2014). Current Trends and the Future of Metamorphic Malware Detection. University of Victoria. Dionysopoulou, N. (2014). The key to advanced malware protection. McAfee. ESET. (2016). Trends 2016 (IN) Security Everywhere. Eset. Idika, N., Mathur, A. P. (2007). A Survey of Malware Detection Techniques. West Lafayette, IN: Purdue University. Li, P., Liu, L., Gao, D., Reiter, M. K. (2010). On Challenges in Evaluating Malware Clustering. Chapel Hill, NC, USA: University of North Carolina. Lindorfer, M., Kolbitsch, C., Comparetti, P. M. (2011). Detecting Environment-Sensitive Malware. Vienna University of Technology. M., A. H. (2008). Malware 101 - Viruses. SANS Institute. M.Papadaki, S.M.Furnell, N.L.Clarke, Bakar, U., G.Pinkney. (2005). Attack Pattern Analysis: Trends in Malware Variant Development . Plymouth, United Kingdom: University of of Plymouth. Mansour, Y., Parrizas, A. A. (2014). An Early Malware Detection, Correlation, and Incident Response System with Case Studies. SANS Institute. Mariotti, J. (2014). An introduction to malware . CERT-UK. Mills, E. (2011). Emerging Trends in Malware - Antivirus and Beyond . WayTek. OECD. (2008). Malicious Software (Malware): A security Threat to Internet Economy. OECD. Oltsik, J. (2013). Malware and the State of Enterprise Security. ESG. Peterson, P. (2006). Malware Trends:The Attack of Blended Spyware Crime . Ironport Systems. Sagar, A. (2009). Current Threat Scenario and Recent Attack Trends. CERTIN.