‘Some security commentators suggest inventing answers to [security] questions rather than using real data.' David Harley.
Big players in email service/technology industry come together to develop standards to combat spam and phishing.
GlavTorg network ceases to promote sites selling imitation designer goods.
The Virus Bulletin prevalence table is compiled monthly from virus reports received by Virus Bulletin; both directly, and from other companies who pass on their statistics.
It’s not just graphic designers who can do interesting things with the Intel MMX instruction set. Virus writers are finding ways to (ab)use some of the instructions, too. Peter Ferrie has the details of W32/Svar.
Even in a mobile world, the principles of malware analysis remain the same. John Foremost takes us through the basic steps in the static analysis of mobile malware.
As the migration to IPv6 slowly begins to happen, Martijn Grooten takes a look at the potential security issues that could occur with the switch to IPv6 and encourages the security industry to ready itself for those challenges.
Morton Swimmer reports from Europe's premier hacker event.
On this occasion, the VB100's annual visit to the Linux platform almost resulted in a clean sweep of passes - just a single file tripping up two products to prevent a full house. John Hawes has all the details.
Must-attend events in the anti-malware industry - dates, locations and further details.