‘“Doing good for all is good for business” – helping others protect their users makes all of us stronger.’ Alex Eckelberry, GFI Software
Facebook introduces bug bounty, pays out $40,000 in first month.
Cybersecurity top concern for businesses despite small drop in cyber attacks.
The Virus Bulletin prevalence table is compiled monthly from virus reports received by Virus Bulletin; both directly, and from other companies who pass on their statistics.
Last year the W32/Deelae family showed that a table that has been overlooked for more than a decade can be redirected to run code in an unexpected manner. Now, a table that was used in Windows on the Itanium platform also exists on the x64 platform, and can be misused too. Peter Ferrie explains how.
Qakbot’s ability to propagate via network shares is enough to cripple an entire network. Add to that the ability to compromise websites and you have a recipe for a highly successful malware attack. Jessa Dela Torre discusses the different ways in which Qakbot variants arrive on and infect systems, how these affect users, and how the security industry can help mitigate Qakbot system infections.
While there is plenty of research on password use and re-use, there is virtually no equivalent research concerning purely numerical passcodes such as PINs. David Harley takes a look at some of the most common four-digit combinations used and the security issues raised.
John Aycock takes the controversial view that Stuxnet is really not that interesting at all. He outlines what makes a piece of malware a game‑changer and explains why last year’s headline hitter is not worth writing home about.
This month's VBSpam test sees 23 products on the test bench, an expansion to the ham corpus and a new test looking at products' ability to filter newsletters correctly.
Must-attend events in the anti-malware industry - dates, locations and further details.