‘The ability to exchange URLs in real time is a particular advantage ... since malicious URLs are usually a time-critical issue.' Philipp Wolf
Japanese government to use virus for defensive purposes.
Researchers demonstrate tools that exploit recently discovered WPS vulnerability.
The Virus Bulletin prevalence table is compiled monthly from virus reports received by Virus Bulletin; both directly, and from other companies who pass on their statistics.
Some virus writers like to brag about themselves via their choice of virus name. It’s rare that the content justifies the bragging though. The author of W64/Svafa named the virus ‘Sigrún’, which is Old Norse for ‘victory rune’. However, there is little to be victorious about as the virus doesn't work. Peter Ferrie has the details.
The latest variants of IRC-based botnets, such as the NGR botnet, are designed to steal sensitive information by exploiting browser processes and acting as backdoors. Aditya Sood and colleagues discuss the framework of the NGR bot version 1.1.0.0, which is growing in prominence in the malware world.
2011 was filled with plenty of security stories involving spam, malware, hacking and more. Terry Zink picks out his top ten newsmakers.
In 2004, the US Federal Trade Commission and the UK’s Office of Fair Trading organized a workshop in London in which 27 international organizations participated. They established an informal cooperation network: the London Action Plan (LAP). Wout de Natris describes some of LAP's early successes and the challenges it now faces.
This month's VBSpam test saw 22 products on the test bench, 20 of which were full solutions and the other two were partial solutions (DNS blacklists). All of the full solutions achieved a VBSpam award but their performance differed greatly in the details. Martijn Grooten reveals more.
Must-attend events in the anti-malware industry - dates, locations and further details.