‘The general level of insight into network infiltration around the globe is becoming more informed.' Kurt Baumgartner, Kaspersky Lab.
Details of VB2014 announced.
Report finds knowledge of procedures and information flows is crucial.
The Virus Bulletin prevalence table is compiled monthly from virus reports received by Virus Bulletin; both directly, and from other companies who pass on their statistics.
Intel introduced a new set of CPUs in 2009 that included hardware support for the Advanced Encryption Standard (AES) in the instruction set. These have not attracted much interest from virus writers - until now. Peter Ferrie describes the W32/Brotinn virus.
Raul Alvarez looks into the execution path of malware that resembles a piece of shellcode inside a help file.
Abhishek Singh looks at some of the techniques that are commonly used by malware to bypass analysis in a virtualized environment.
While some are claiming that AV is so far past its best before date that it should only be used when given away free, David Harley asks on what basis this judgement has been made, and whether the reality is that anti-virus is simply no longer the same product as it was decades ago.
The topic of cybersecurity and international cooperation usually involves difficult discussions about cross border jurisdiction issues, the need for cooperation between very different actors, and privacy. Wout de Natris considers the issues and asks: are there first-mover advantages when it comes to cooperation in cybersecurity? Can a collective action make a difference, and if so what could the first actions be?
This month sees the VB test team taking their annual look at anti-malware products for the Linux world. John Hawes has the details.
Must-attend events in the anti-malware industry - dates, locations and further details.