‘Capturing the imagination of end‑users when it comes to security education is one of the greatest hurdles.' Helen Martin, Virus Bulletin
Researchers show malware on a mobile device can be triggered by music.
New 'cyber army' for Indonesia and CERT for Jamaica.
The Virus Bulletin prevalence table is compiled monthly from virus reports received by Virus Bulletin; both directly, and from other companies who pass on their statistics.
SKAgent, a simple, unencrypted, unsophisticated piece of malware, sends spam messages via Skype. Raul Alvarez describes the simple copy-and-paste technique it uses to do so.
A cross-infector of unrelated platforms is typically implemented as two viruses stuck together, because that’s the easiest way to do it - but if the general mechanics of file enumeration and infection are the same across the affected platforms, then a virus can implement an abstraction layer and expose APIs that each of the routines can call to perform essential functions. {W32/Linux/OSX}/Clapzok does just that - Peter Ferrie has the details.
There is often a disconnect between academic security research and anti-malware industry research – in both directions. Dr John Aycock, Associate Professor at the Department of Computer Science, University of Calgary, embarks on a new regular feature in which each month he will pick some of the work going on in academic circles and summarize the key points. This month: Content-Agnostic Malware Protection.
Thanks to its widespread use in legitimate applications, Java has seen a lot of use in malware and exploit kits recently, with one of the most common exploit techniques being to disable the Java security manager. Abhishek Singh and Shray Kapoor present the logic used by malware authors to set the security manager to null.
The exchange rate of the digital currency Bitcoin (BTC) passed the US$200/BTC1 mark earlier this year – a fact that has not escaped the attention of cybercriminals. Micky Pun takes a look at one of the latest Bitcoin-mining malware families.
The VB100 test team pays its first visit to the Windows Server 2012 platform - and finds things generally rather slow and awkward, with a disappointing number of products displaying stability issues. John Hawes has all the details.
Must-attend events in the anti-malware industry - dates, locations and further details.