Viruses, trojans and other malware

Last Updated on 11 Jan. 2017, Total: 39 Articles and Tutorials

  1. A First Look at Microsoft's Anti Spyware Beta

    Over the last couple of years, spyware has grown from being a nuisance into being an epidemic. Although many tools exist for fighting spyware, they largely focus on the recovery of infected systems and have been mostly ineffective in the war against spyware. A few weeks ago however, Microsoft unveiled the first beta of their own anti spyware solution. Although... Read More

  2. Advanced Persistent Threat Perception and Reaction (Part 1)

    In part one of the series we concentrate on identifying APTs as well as the first steps to safeguarding against APTs attacks with insight into asset clarification and security posture assessment... Read More

  3. Binders and Malware (Part 1)

    How malware authors bind the malware to legitimate files... Read More

  4. Binders and Malware (Part 2)

    Malware binder YAB - how to bind various parts together... Read More

  5. Binders and Malware (Part 3)

    Binding malware specimen to Pong.exe with the binder YAB... Read More

  6. Binders and Malware (Part 4)

    Taking a look under the hood of our newly created malware... Read More

  7. Building a Malware Analysis Lab

    In this article I am going to discuss some of the things that need to be taken into consideration when building a malware analysis lab... Read More

  8. Darwinism Meets the Virus and Worm

    Viruses are largely a threat that is contained if one has an anti-virus solution. This begs the question of what then is the next big threat in terms of malware code? The answer to that would be the new, and more lethal worms such as Slammer for one. What would happen though if someone with coding talent were to harness... Read More

  9. How Spyware And The Weapons Against It Are Evolving

    Spyware has reached epidemic proportions and is only getting worse. I have seen recent statistics indicating that approximately 95% of the world’s PCs are infected with spyware. Unfortunately, removal techniques that worked just a couple of months ago are no longer effective in many cases and new types of spyware being released are more advanced than most computer viruses. In... Read More

  10. How spyware & adware programs threaten network security & performance

    This article will focus on the applications that are installed on your network and home computers, which many security professionals and organizations do not know exist. These applications run in a discrete background operation and function as a spy reporting on user activity and habits that are recorded in day to day use of the computer system... Read More