Fifteen full solutions and three DNS-based blacklists lined up on the test bench for this VBSpam test and all but one of the full solutions reached the performance level required to earn a VBSpam award. Perhaps more impressively, eight of them achieved a VBSpam+ award. Martijn Grooten reports.
Being able to find files that are similar to a particular file is quite useful, although it can be difficult to handle at scale. It can often require an infeasible number of comparisons, which need to take place outside of a database. In an attempt to make this task more manageable, Brian Wallace has devised an optimization to ssDeep comparisons, which drastically decreases the time required to compare files.
In November 2003, Martin Lee summarized from a UK perspective the various legislative attempts to ban the abuse of email by law.
Aditya K. Sood and Rohit Bansal look at a different side of an exploit kit: the interface used by the malware authors who rely on exploit kits to get their malware installed on victims' machines.
In February 2000, distributed denial of service, or DDoS, attacks disrupted some of the largest websites – CNN, MSN, Yahoo and others – sites designed to serve millions of pages per day. So Nick FitzGerald asked: what are DDoS attacks? How might they affect you and what should you do to avoid them?
The banking trojan Shifu appears to inherit some of its features from several other well-known banking trojans. Floser Bacurio and Wayne Low decided to take a close look at one of its droppers.