Anti-virus is dead. Again. Actually, the corpse has been walking and talking for so long that it’s a wonder no one has called Buffy Summers [1] to put a stake through its heart. However, one of our…
This paper considers the differences that caused Win32/Dorkbot to become the most detected threat in Latin America. Techniques used for system infection, spreading and social engineering are analyzed…
Authors: Basquiran, Wren. A comparative analysis on the performance, effectiveness and usability of seven security solutions. PassMark Software evaluated the following business endpoint security…
To store their payload and configuration information, malware families employ a range of mechanisms such as hidden storage to counteract forensic analysis. The paper contains details of the use of…
Technical analysis of the Festi botnet, one of the most powerful botnets for sending spam and performing DDoS attacks. The bot has several striking features: strong resistance to forensic analysis and…
Authors Matrosov and Rodionov provide comparison charts/detailed information regarding: Typical malware vs. Stuxnet/Flame, flamer code reconstruction problems, flamer framework overview, object…