‘[In] the digital realm ... we tread very carefully and avoid reporting [incidents] for fear of divulging sensitive data, i.e. the IP address.' Wout de Natris.
VB is seeking submissions from those wishing to give presentations dealing with up-to-the-minute specialist topics at VB2012.
Researchers find that an alarming number of iOS apps access data without the user’s permission.
The Virus Bulletin prevalence table is compiled monthly from virus reports received by Virus Bulletin; both directly, and from other companies who pass on their statistics.
Recently, we have seen a new trend in ZAccess: less is more. In around March 2012, the aggressive self-defence technique had disappeared from some variants, and in June 2012, the whole rootkit was removed, making it a completely user-mode piece of malware. Neo Tan and Kyle Yang describe the details of the latest versions of ZAccess.
Aditya Sood and colleagues present an analysis of ICE IX bot, a descendent of the Zeus bot which demonstrates how one bot can give rise to another.
There are multiple ways to hide the decoder, such as by forcing Windows to apply a relocation delta, or by using obscure instruction side effects. Now, W32/Tussie shows us a way to hide the encoded data. Peter Ferrie has the details.
As a form of anti-debugging/anti-emulation, some malicious programs insert garbage code within their instructions. Raul Alvarez looks at the use of garbage code and unsupported or rarely used APIs by recent malware.
The latest VB100 test on Windows 7 generally saw better product stability than expected, although a lower pass rate than the last test - one third of products failing to achieve VB100 certification this time. John Hawes has all the details.
Must-attend events in the anti-malware industry - dates, locations and further details.