A computer file may be scanned for suspicious words 18 occurring within
suspicious contexts 20. Thus, messages embedded by malware authors within
their malware may be detected. The detection of such embedded messages
may be used to identify otherwise unknown items of malware or as a
pre-filtering technique for controlling the use of further scanning
techniques.