There was a pleasingly high pass rate in this server-based VB100 test, and along with it some fairly good stability ratings with no products falling below the ‘Fair’ category. John Hawes has the details.
There exist few studies that attempt to systematically quantify maliciousness in popular, long-lived websites. In his VB2014 paper, Paul Royal details the results of long-running experiments that identify maliciousness in top-ranked websites in a vulnerability- and exploit-independent manner.
During a long-term investigation, Brian Wallace discovered two forensic artefacts - both GUIDs - which can be used to determine whether multiple malware samples are from the same Visual Studio project, effectively identifying the family, and to identify samples that are the result of the same build, allowing for the identification of post-compilation modifications made by tools such as builders. Here, he describes his discoveries and how these new artefacts can help malware hunters around the world.
Beta BEP appears to be the latest exploit kit in development. After finding their way into a Beta BEP C&C panel, Aditya Sood and Rohit Bansal were able to gather intelligence about the structure and working of the exploit pack. Here they share their findings about the pack - which they believe we will start to see being used in the coming months.
Everything you ever wanted to know about macro viruses but were afraid to ask! Dr Igor Muttik begins a series of articles dedicated to them.
Everything you ever wanted to know about macro viruses but were afraid to ask! In this part: WordBasic, VBA, up/down conversion and polymorphism.
Everything you ever wanted to know about macro viruses but were afraid to ask! In this part: mating, devolving, naming and prevalence.
Melissa caused havoc across the globe and hit the news headlines. Ian Whalley's full analysis cuts through the hype and reveals a rather ordinary Class-style infector.
Sarah Gordon has spent years researching the whys and wherefores of virus writing. The first instalment of her three-part feature attempts to explain the inexplicable.
In the second part of her series of articles on virus writers, Sarah Gordon examines the question ‘How have they changed?’.
So far in her series of articles on virus writers, Sarah Gordon has covered five of the most frequently asked questions concerning virus writers. In this, the third and final part of the series, she examines the question that seems to raise the most heated debate of all: why do they do it?
During a long-term investigation, Brian Wallace discovered two forensic artefacts - both GUIDs - which can be used to determine whether multiple malware samples are from the same Visual Studio project, effectively identifying the family, and to identify samples that are the result of the same build, allowing for the identification of post-compilation modifications made by tools such as builders. Here, he describes his discoveries and how these new artefacts can help malware hunters around the world.