'I believe that if the human factor is such a significant part of the problem, then it must also form part of the solution.' David Emm, Kaspersky Lab.
Panda sells majority shareholding.
$400m for British web-filtering company.
Test procedures clarified.
Dr.Web results corrected.
The Virus Bulletin prevalence table is compiled monthly from virus reports received by Virus Bulletin; both directly, and from other companies who pass on their statistics.
The time between the announcement and exploitation of vulnerabilities continues to shrink - especially in the case of stack overflow vulnerabilities, which require very little skill to exploit. Peter Ferrie describes a prime example: the recent ANI vulnerability and its exploits.
While not technically a new virus (being modelled on the almost ancient Tenrobot family), W32/Virtu does introduce some interesting changes and new techniques. Víctor Álvarez and Mario Ballano describe this polymorphic file infector that also behaves as an IRC bot.
Nirbot gains its notoriety primarily from the cat fight in which its author has been engaged. Although keenly aware of the descriptions and blog entries posted about his creations, the author seems not to be so well versed on the naming conventions used within the AV industry. Lysa Myers shares the details of this technologically unremarkable, yet reasonably successful bot.
Can a botmaster send commands covertly to a botnet of over a million zombies and control them in real time? John Aycock considers how such a botmaster’s command channel might look.
John Hawes shares his experiences with Trend Micro's PC-cillin Internet Security suite.
Must-attend events in the anti-malware industry - dates, locations and further details.
Anti-spam news; MIT Spam Conference 2007 (conference report)