It adds insult to injury when the major media outlets misrepresent the facts.
Cross-infector viruses demonstrate the flexibility of certain file formats. While some of these viruses have clearly been written to maximise their replication potential, most seem to have been written simply to show that it can be done. Peter Ferrie takes a look at three of the latest Cross-infector viruses on the scene
Using components of Windows multilingual support, it is possible to create a file that will capture keystrokes on a target system while using the OS to protect that file from removal or deletion. Masaki Suenaga explains how an IME could be used as a keylogger.
Andreas Marx reports on his extensive false positive testing of anti-virus software.
Kaspersky's David Emm comments on the KAV 5.0 writeup from last month's comparative review. Virus Bulletin's Matt Ham responds.
VB2005 was a double record breaker - Virus Bulletin's longest and largest conference to date. We were delighted to welcome well over 360 delegates to The Burlington hotel in Dublin for the debut of the event's new longer format - and, for the second year in a row, the conference was described by delegates as the best VB conference they had attended.
Matt Ham Reviews the latest offering from Eset - NOD32 for Windows NT/2000/XP/2003/X64 with centralized management