‘We're wasting more time than ever dealing with malware that is more hostile than ever.’ John Levine, Taughannock Networks.
Security to be prioritized to prevent future data losses.
Software giant wins court order to take down botnet command and control centres.
Three to four acquisitions planned per year.
The Virus Bulletin prevalence table is compiled monthly from virus reports received by Virus Bulletin; both directly, and from other companies who pass on their statistics.
If a file contains no code, can it be executed? Can arithmetic operations be malicious? In W32/Lerock we have a file that contains no code, and no data in any meaningful sense. All it contains is a block of relocation items. Peter Ferrie untangles the mystery.
New BackDoor.Tdss rootkits are sophisticated pieces of malware. Alexey Tkachenko and Artem Baranov detail the BackDoor.Tdss.565 rootkit - which presented surprises within minutes of the start of its analysis.
Morton Swimmer reports on the information fest at the 26th Congress of the Chaos Computer Club.
Following last month's introduction to memory analysis, Ken Dunham walks through the process using Haxdoor as an example.
The VB test team took a closer look at CA's latest product for the home market. John Hawes has the details.
VB is delighted to report that, for the first time, all 16 of the products in this month's test earned VBSpam certification. Martijn Grooten has all the details.
Must-attend events in the anti-malware industry - dates, locations and further details.