Throwback Thursday: The malware battle: reflections and forecasts

Posted by   Helen Martin on   Jan 5, 2017

"Another year has come to its end and the malware battle still rages on. It seems to be a never-ending uphill struggle to secure digital information." This could have been written just weeks ago, but in fact comes from an article written 13 years ago, in which Jamz Yaneza reflected on the year just ended and pondered what 2004 would have in store for the AV industry.

Throwback-Thursday-VB.jpg

Jamz observed that, in 2003, mass-mailing worms were using email with social engineering to entice users to click and execute attachments; self-compression and encryption coupled with anti-debugging code was a growing concern; vulnerabilities and bugs in commonly used software were becoming favourite tools in attackers' arsenals; there was a noticeable increase in malware employing Denial of Service attacks; and the use of self-installing malware URLs to pull down updates and components from hacker-compromised Internet locations was an emerging technique.

Jamz also made some predictions for the year ahead, imagining that 2004 would see, among other things, more blended threats; continued attempts by malware to disable anti-virus, personal firewall and anti-trojan programs; and the need for web-filtering software in corporate environments to prevent inadvertent redirection to malware-related websites.

Read all of Jamz's observations and predictions here in HTML-format, or download the article here as a PDF.

 

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

VB2017 paper: Nine circles of Cerber

Cerber is one of the major names in the world of ransomware, and last year, Check Point released a decryption service for the malware. Today, we publish a VB2017 paper by Check Point's Stanislav Skuratovich describing how the Cerber decryption tool…

Attack on Fox-IT shows how a DNS hijack can break multiple layers of security

Dutch security firm Fox-IT deserves praise for being open about an attack on its client network. There are some important lessons to be learned about DNS security from its post-mortem.

Throwback Thursday: BGP - from route hijacking to RPKI: how vulnerable is the Internet?

For this week's Throwback Thursday, we look back at the video of a talk Level 3's Mike Benjamin gave at VB2016 in Denver, on BGP and BGP hijacks.

Security Planner gives security advice based on your threat model

Citizen Lab's Security Planner helps you improve your online safety, based on the specific threats you are facing.

VB2017 video: Spora: the saga continues a.k.a. how to ruin your research in a week

Today, we publish the video of the VB2017 presentation by Avast researcher Jakub Kroustek and his former colleague Előd Kironský, now at ESET, who told the story of Spora, one of of the most prominent ransomware families of 2017.