Common updates are needed to detect new threats, but unidentified attacks with no signatures can bypass this systemObfuscation can be utilized to avoid currently being detected by creating a information difficult to understand, thus hiding an attack. The terminology of obfuscation suggests altering software code in this type of way which keeps it f