Viruses, trojans and other malware

Last Updated on 11 Jan. 2017, Total: 39 Articles and Tutorials

  1. Social Engineering meets the Bot (Part 3) - All is Revealed

    In the final installment of this article series we get to see the trojan operate at the packet level itself. No matter how clever the exploit, or trojan it must still dial home as it were. It will do so at the packet level, which we will examine... Read More

  2. Social Engineering meets the Bot (Part 2)

    In part two if this article is where we begin to get some answers. Much like the fabled trojan horse contained soldiers who opened the gates of Troy our supposed ASM is not what it appears to be... Read More

  3. Social Engineering meets the Bot (Part 1)

    All exploits or malware leverage a specific weak link in a program. This is done through various means. Social engineering on the other hand exploits the human link. What though if both an exploit and social engineering were combined? Read on to find out how both worlds collide... Read More

  4. Darwinism Meets the Virus and Worm

    Viruses are largely a threat that is contained if one has an anti-virus solution. This begs the question of what then is the next big threat in terms of malware code? The answer to that would be the new, and more lethal worms such as Slammer for one. What would happen though if someone with coding talent were to harness... Read More

  5. How Spyware And The Weapons Against It Are Evolving

    Spyware has reached epidemic proportions and is only getting worse. I have seen recent statistics indicating that approximately 95% of the world’s PCs are infected with spyware. Unfortunately, removal techniques that worked just a couple of months ago are no longer effective in many cases and new types of spyware being released are more advanced than most computer viruses. In... Read More

  6. Malware - It's Getting Worse

    The recent MyDoom Worm successfully infected enough victims in order to shut down SCO's web site, followed by new variants that targeted Microsoft's web site. This paper isn't intended to discuss the motives of the author, instead it will help you understand how worms enter your network, how you can block them before they even reach your internal network, and... Read More

  7. How spyware & adware programs threaten network security & performance

    This article will focus on the applications that are installed on your network and home computers, which many security professionals and organizations do not know exist. These applications run in a discrete background operation and function as a spy reporting on user activity and habits that are recorded in day to day use of the computer system... Read More

  8. Trojan Horse Primer

    A Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can gain control and do its chosen form of damage, such as erasing the data on your hard drive. A Trojan can cause massive harm to you and your systems and worse yet, may... Read More

  9. Trojans FAQ

    We have all heard alot about trojan horse programs and the threat that they pose to your network's security. This Trojan FAQ sheds some light on what these programs are, what they do, how they can infect your network and suggests measures that could be taken to prevent such infections. You can make sure that you have a good grasp... Read More