'Monitoring darknet traffic yields great visibility into what threats are present.’ Jose Nazario, Arbor Networks.
February's goings on in the anti-malware industry.
The Virus Bulletin prevalence table is compiled monthly from virus reports received by Virus Bulletin; both directly, and from other companies who pass on their statistics.
The latest edition to the W32/Chiton family is a malicious plug-in for one of the most popular tools of the anti-malware trade: the IDA disassembler and debugger. Peter Ferrie provides the details.
In early 2007, Trojan.Peacomm (a.k.a. the ‘Storm trojan’) demonstrated that legitimate P2P protocols can be used effectively to coordinate virus networks. Elia Florio and Mircea Ciubotariu explain how.
Testing security products can be a complex task - especially validating the effectiveness of technology against threats that evolve at an extremely rapid rate. Adam O'Donnell consdiers the current state of anti-virus testing.
'As things currently stand, anyone who has pornographic images appearing on their screen as a result of malware on their PC, or being trapped in a continuous pop-up loop, is at risk of conviction if there are minors in the vicinity.' Alex Shipp, MessageLabs.
John Hawes takes an indepth look at AEC's TrustPort Workstation.
Must-attend events in the anti-malware industry - dates, locations and further details.
Anti-spam news; A phish with a sting in the tail (feature); Enhancing the efficiency of learning-based spam filters (feature)