Whole site keyword search

February issue of VB published

The February issue of Virus Bulletin is now available for subscribers to download.
David Harley asks on what basis this judgement has been https://www.virusbulletin.com/blog/2013/02/february-issue-vb-published/

February

Targeted attacks: what's in store? (comment); A(C)ES high (malware analysis); Please help! (malware analysis); Techniques for evading automated analysis (feature); Anti-virus: last rites, or rites of passage? (commentary); Breaking down barriers for cyber…
David Harley asks on what basis this judgement has been … the same product as it was decades ago. David Harley https://www.virusbulletin.com/virusbulletin/2013/02/

2013

Latest news from the anti-virus industry provided by independent anti-virus advisors, Virus Bulletin
speak to VB2013 presenters Lysa Myers and David Harley about their research interests and what they https://www.virusbulletin.com/blog/2013/

My PC has 32,539 errors: how telephone support scams really work

Fake security products, pushed by variations on Black Hat SEO and social media spam, constitute a highly adaptive, longstanding and well-documented area of cybercriminal activity. By comparison, lo-tech Windows support scams receive far less attention fro…
David Harley ESET Martijn Grooten Virus Bulletin Steven https://www.virusbulletin.com/conference/vb2012/abstracts/my-pc-has-32-539-errors-how-telephone-support-scams-really-work/

EICAR 2012

Eddy Willems presents a roundup of this year's EICAR conference in Portugal.
this is not likely to stop. David Harley gave two presentations this year. The first https://www.virusbulletin.com/virusbulletin/2012/06/eicar-2012/

Living the meme

‘Some security commentators suggest inventing answers to [security] questions rather than using real data.' David Harley.
questions rather than using real data.' David Harley. Copyright https://www.virusbulletin.com/virusbulletin/2012/02/living-meme/

February

Living the meme (comment); If Svar is the answer... (malware analysis); Static analysis of mobile malware (tutorial); And the devil is six: the security consequences of the switch to IPv6 (feature); Behind enemy lines: reporting from the CCC 28C3 Congress…
questions rather than using real data.' David Harley. David Harley https://www.virusbulletin.com/virusbulletin/2012/02/

February issue of VB published

The February issue of Virus Bulletin is now available for subscribers to download.
questions rather than using real data.' David Harley. If Svar is the https://www.virusbulletin.com/blog/2012/02/february-issue-vb-published/

SMS trojan targets Android users in eight western countries

Will another piece of mobile malware convince Google manager of the seriousness of the threat?
Ferguson here with another one from ESET's David Harley on a personal blog here. Posted on 25 https://www.virusbulletin.com/blog/2011/11/sms-trojan-targets-android-users-eight-western-countries/

September

Should there be an AV industry code of ethics? (comment); 'Holey' virus, Batman! (malware analysis); Qakbot: a disaster waiting to happen (feature); Hearing a PIN drop (feature); Stux in a rut: why Stuxnet is boring (opinion);
purely numerical passcodes such as PINs. David Harley takes a look at some of the most common … used and the security issues raised. David Harley https://www.virusbulletin.com/virusbulletin/2011/09/

Hearing a PIN drop

While there is plenty of research on password use and re-use, there is virtually no equivalent research concerning purely numerical passcodes such as PINs. David Harley takes a look at some of the most common four-digit combinations used and the security …
David HarleySmall … purely numerical passcodes such as PINs. David Harley takes a look at some of the most common https://www.virusbulletin.com/virusbulletin/2011/09/hearing-pin-drop/

September issue of VB published

The September issue of Virus Bulletin is now available for subscribers to download.
purely numerical passcodes such as PINs. David Harley takes a look at some of the most common https://www.virusbulletin.com/blog/2011/09/september-issue-vb-published/

Daze of whine and neuroses (but testing is FINE)

According to Aerosmith (not to mention The Italian Job), FINE is an acronym for (in its politer version) Freaked out, Insecure, Neurotic and Emotional. We could (and probably will) offer alternatives, but there's no doubting that anti-malware testing insp…
David Harley ESET Larry Bridwell AVG download slides https://www.virusbulletin.com/conference/vb2011/abstracts/daze-whine-and-neuroses-testing-fine/

EICAR 2011: a 20th anniversary in Austria

Eddy Willems reports on some of the topics, debates and research presented at the EICAR 2011 conference.
David Harley from ESET explained how difficult it can be https://www.virusbulletin.com/virusbulletin/2011/06/eicar-2011-20th-anniversary-austria/

March

What next for rogue AVs? (comment); Flibi night (malware analysis); Defeating mTANs for profit - part one (technical feature); Canada's new anti-spam law (feature); A nice drop of Cocoa (book review); VBSpam comparative review March 2011 (comparative revi…
and with this in mind David Harley reviews a book that aims to help Mac … the beginning of the development process. David Harley https://www.virusbulletin.com/virusbulletin/2011/03/

March issue of VB published

The March issue of Virus Bulletin is now available for subscribers to download.
and with this in mind David Harley reviews a book that aims to help Mac https://www.virusbulletin.com/blog/2011/03/march-issue-vb-published/

A nice drop of Cocoa

Mac security in general attracts a lot of attention these days, and with this in mind David Harley reviews a book that aims to help Mac developers build security into their apps from the beginning of the development process.
David HarleyMac … and with this in mind David Harley reviews a book that aims to help Mac https://www.virusbulletin.com/virusbulletin/2011/03/nice-drop-cocoa/

Rooting about in TDSS

During the course of their research into the TDSS rootkit, Aleksandr Matrosov and Eugene Rodionov developed a universal utility for dumping the rootkit’s hidden file system. Here they provide the details
With special thanks to David Harley for participating in this research. https://www.virusbulletin.com/virusbulletin/2010/10/rooting-about-tdss/

September

Breaking the habit (comment); The missing LNK (malware analysis); Injection as a way of life (malware analysis); Chim Chymine: a lucky sweep? (malware analysis); Anti-unpacker tricks - part eleven (technical feature); What's the deal with sender authentic…
experimenting with LNK files. David Harley has the details. David Harley https://www.virusbulletin.com/virusbulletin/2010/09/

Chim Chymine: a lucky sweep?

Apart from generating detection for Stuxnet, ESET also started to detect its approach heuristically and it wasn't long before new malware families appeared, experimenting with LNK files. David Harley has the details.
experimenting with LNK files. David Harley has the details. Copyright https://www.virusbulletin.com/virusbulletin/2010/09/chim-chymine-lucky-sweep/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.