February issue of VB published

Posted by   Virus Bulletin on   Feb 1, 2011

The February issue of Virus Bulletin is now available for subscribers to download.

The February 2011 issue of Virus Bulletin is now available for subscribers to browse online or download in PDF format.

Some of the things this month's issue has in store are:

  • VB100 comparative review: John Hawes reveals the results of the latest round of VB100 certification testing on Ubuntu Linux Server Edition.
  • How much malware is really out there?: 'For most people even a single piece of malware is too much - especially if they are currently affected by it.' Robert Sandilands, Commtouch
  • $$$_+$$+$$__+_$+$$_$+$$$_+$$_$: JJEncode is a JavaScript encoding method that produces files that contain no alphanumeric characters. A demonstration version is freely available from the author's website, and has already been used in malware. Peter Ferrie describes how it works.
  • DLL hijacking: There are a few good reasons for taking another look at DLL hijacking - including the fact that we don't learn from our mistakes. Aleksander Czarnowski takes an in-depth look at the DLL hijacking story.
  • Calling all speakers: VB2011 Barcelona: VB is seeking submissions from those wishing to present papers at VB2011 - the 21st Virus Bulletin International Conference in Barcelona.
  • Introduction to hostile Java analysis: Fraudsters have abused Java to obfuscate attacks, hinder research and response, and maximize profits. Security experts need an understanding of common Java-based attacks and their implications in order to respond to emerging threats in the wild. Ed Jones presents an introduction to hostile Java analysis.
  • The top 10 spam, malware and cybersecurity stories of 2010: Spam, malware and general security topics all hit the headlines in 2010. Terry Zink takes a look back at the biggest newsmakers of the year.

Subscribers click here to access the issue.

If you are not already a subscriber why not take the chance to subscribe now.

Posted on 04 February 2011 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VBSpam tests to be executed under the AMTSO framework

VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework.

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.