Cybercrime certainly feels like a major threat to the security of networked systems upon which so much of daily life depends in the world today. Criminals routinely use digital networks to steal data, defraud companies and consumers, and disrupt…
In 1994, UK Fraud Squad detectives started making inroads into the most puzzling 'Whodunnit' since the Great Train Robbery. Had an outbreak of computer crime swept Britain? No, it was all part of a police training program.
The VBWeb certification scheme measures the effectiveness of gateway web filtering technologies, testing how well they block access to dangerous sites and pages without preventing workers from reaching useful resources online. Here, we report the…
Android 5.0 is trying to set itself up as a safe corporate mobile operating system by touting SEAndroid and containerization. The enforcement of SEAndroid and containerization has been changing the way OEMs and security vendors respond to security…
VolatilityBot is a new automation tool for researchers which cuts all the guesswork and manual tasks out of the binary extraction phase of malware analysis. Not only does it automatically extract the executable (exe), but it also fetches all new…
In August 1996, Sarah Gordon explored attitudes to virus distribution facilitated by the Internet, predicting that our increased reliance on the Internet for communication, and the retrieval of information from untrusted systems, would bring more…
This month’s small selection of products tested on SUSE Linux Enterprise Server 12 all met the basic requirements of VB100 certification, and went much further in their strong detection rates and useful features.