'Our jobs and our day-to-day successes and failures are still as much about people and what they do (and don't do) as they ever were.' Max Morris, independent author, USA.
Symantec settles adware case.
Troublesome month for security vendors.
The Virus Bulletin prevalence table is compiled monthly from virus reports received by Virus Bulletin; both directly, and from other companies who pass on their statistics.
The Locksky email worm first appeared in October 2005. Its aim is to install proxies on victims' machines, which can then be sold. Ferenc Laszlo Nagy has the details.
Two years after its emergence the Beagle family is still one of the most pervasive families of Internet worms. John Canavan takes a close look at one variant that has made the surprising switch from email to ICQ as its major infection vector.
Steen Pedersen explains how the perimeter defence layer can be enhanced with the use of a web filter.
Dynamic translation is a technique that can be used instead of emulation for decrypting complex malware. Adrian Stepan describes how the technique can also be used to perform generic unpacking.
VB's product reviewer Matt Ham describes some changes to the test sets used for VB's comparative reviews.
Metamorphic viruses have posed a challenge for the anti-virus industry for quite some time. This article focuses on a number of metamorphic techniques and highlights different methods for detecting them.
This month's anti-spam news and Andrej Bratko describes the use of data compression models to fight spam.