‘We hope soon to be able to provide a better reflection of the growing diversity of the security solution market.’ John Hawes
Malware was capable of reading PINs and data of the cards inserted into ATMs.
Wapomi is a virus with trojan-like behaviour. It was originally detected as long as a couple of years ago, yet it is still very active in the wild. Raul Alvarez takes a look at some of the malware’s functionalities in an attempt to shed light on its persistence.
In the first and second parts of his series on the Necurs rootkit, Peter Ferrie looked at what it does to hook the system. In part 3, he takes a look at what those hooks actually do.
With a modular architecture and sophisticated functionality, Sinowal is a multi-component banking trojan targeted at various web browsers which threatens users of online banking systems around the globe. Chao Chen delves into the inner workings of each of the components of this powerful malware.
Paul Baccas reviews the third novel in Mark Russinovich's Jeff Aiken series.
In the last of his ‘Greetz from academe’ series, highlighting some of the work going on in academic circles, John Aycock looks at change in the form of Android update flaws, as well as spare change under the guise of academic funding.
As indicated by the considerable payouts we see being made for valid security vulnerabilities, finding valuable 0-days is not an easy task. Fuzzing – the most common approach to bug hunting – is technologically and scientifically well developed and well documented, yet simply running some fuzzers isn't enough to achieve the desired outcome. Alisa Esage attempts to pin down the secret ingredient for successful bug hunting.
The VB test team put 29 products through their paces on Windows Server 2012. John Hawes has the details.
Must-attend events in the anti-malware industry - dates, locations and further details.