Share and share alike (comment); Wapomi (malware analysis); The curse of Necurs, part 3 (malware analysis); Sinowal banking trojan (malware analysis); Rogue Code (book review); Greetz from academe: Will research for food (spotlight); Fuzzing everything in…
John Aycock looks at change in the form of Android … under the guise of academic funding. John Aycock https://www.virusbulletin.com/virusbulletin/2014/06/
A grown-up industry (comment); Neurevt botnet: new generation (malware analysis); Anatomy of Turla exploits (malware analysis); The curse of Necurs, part 2 (malware analysis); On cyber investigations. Case study: a money transfer system robbery (feature);…
John Aycock looks at … containment for Android devices. John Aycock https://www.virusbulletin.com/virusbulletin/2014/05/
Threat intelligence sharing: tying one hand behind our backs (comment); The shape of things to come (announcement); The curse of Necurs, part 1 (malware analysis); More fast of more dirty? (malware analysis); Tofsee botnet (malware analysis); Back to VBA …
John Aycock looks at a paper that describes how … app review process. John Aycock https://www.virusbulletin.com/virusbulletin/2014/04/
Making the case for incident response (comment); A short visit with a virus (malware analysis); ProxyCB, a spam proxy under the radar (malware analysis); Solarbot botnet (malware analysis); Not Expir-ed yet (malware analysis); BYOT: Bring Your Own Target …
Censored John Aycock highlights an ACSAC paper that looks at the … of detecting web content modifications. John Aycock https://www.virusbulletin.com/virusbulletin/2014/03/
In the latest of his ‘Greetz from Academe’ series, highlighting some of the work going on in academic circles, John Aycock looks at a piece of research that reveals an anti-virus design vulnerability that leaves several of the major anti-virus products op…
John AycockUniversity of … John Aycock looks at a piece of research that reveals an https://www.virusbulletin.com/virusbulletin/2014/02/greetz-academe-full-frontal/
It is time for defenders to go on the offence (comment); Getting one's hands dirty (malware analysis); Salted algorithm - part 2 (malware analysis); Inside W32.Xpaj.B's infection - part 2 (malware analysis); Needle in a haystack (feature); Don't forget to…
John Aycock looks at a piece of research that reveals an … products open to attack. John Aycock https://www.virusbulletin.com/virusbulletin/2014/02/