‘Why doesn’t Windows tell me when that very important signature has been tampered with?' Roel Schouwenberg, Kaspersky Lab
TalkTalk incurs the wrath of the ICO after covert trials of a new anti-malware system.
Calling all budding anti-malware rappers...
The Virus Bulletin prevalence table is compiled monthly from virus reports received by Virus Bulletin; both directly, and from other companies who pass on their statistics.
LNK files are everywhere in Windows, so ubiquitous that they are rarely even recognized for what they are. Overall, LNK files do not pose a direct threat, but then there are the LNK files produced by W32/Stuxnet, which allow the execution of arbitrary code without the need for any user interaction. Peter Ferrie has the details.
Injecting code into a process is not a new technology, but it is still used by most prevalent malware today. Raul Alvarez dissects two examples of recent prevalent malware and shows how they inject their code into a running process.
Apart from generating detection for Stuxnet, ESET also started to detect its approach heuristically and it wasn't long before new malware families appeared, experimenting with LNK files. David Harley has the details.
Last year, a series of articles described some tricks that might become common in the future, along with some countermeasures. Now, the series continues with a look at tricks that are specific to debuggers and emulators.
Sender authentication is a hot topic in the world of email. It has a number of uses and a number of suggested uses. Which ones work in real life? Which ones don’t quite measure up? Can we use authentication to mitigate spoofing? Can we use it to guarantee authenticity? And how do we authenticate email, anyway? Terry Zink provides the answers to these questions and more, this month focusing on the use of encryption in email.
A new spam feed and an expansion of the ham corpus ensured that anti‑spam products in this month’s test were tested to their full abilities. Martijn Grooten has the results.
Must-attend events in the anti-malware industry - dates, locations and further details.