The AV industry in the post-Snowden era (comment); Medfos - an all-purpose redirector (malware analysis); Salted algorithm - part 1 (malware analysis); Inside W32.Xpaj.B's infection - part 1 (malware analysis); Greetz from academe: Ringing in the new (spo…
John Aycock focuses on computer science … code obfuscations in packer tools. John Aycock https://www.virusbulletin.com/virusbulletin/2014/01/
Surveillance and servility: is the AV industry a puppet of statecraft? (comment); In memoriam: Péter Ször 1970-2013 (obituary); Onkod: a downloader and its 'downloadee' (malware analysis); Fake KakaoTalk security plug-in (malware analysis); Hands in the c…
John Aycock looks at a tool designed to detect … containing malicious evasions. John Aycock https://www.virusbulletin.com/virusbulletin/2013/12/
Python obfuscation is relatively rare. In the latest of his ‘Greetz from academe’ series, highlighting some of the work going on in academic circles, John Aycock takes a look at a research paper in which the authors reverse engineered a 'hardened' Python …
John AycockUniversity of … John Aycock takes a look at a research paper in which https://www.virusbulletin.com/virusbulletin/2013/11/greetz-academe-monkey-vs-python/
Perhaps email is broken after all (comment); VB2013: Berlin time (conference report); Another tussle with Tussie (malware analysis); Neurevt bot analysis (malware analysis); When ZAccess becomes a debugger (malware analysis); The murky waters of the Inter…
John Aycock takes a look at a research paper in which … Python application from Dropbox. John Aycock https://www.virusbulletin.com/virusbulletin/2013/11/
Have NSA leaks given us our cyber-Chernobyl? (comment); Doin' the eagle rock... again! (malware analysis); Same Zeus, different features (malware analysis); Inside an iframe injector: a look into NiFramer (malware analysis); In search of a secure operatin…
counting Jedis John Aycock considers Internet censuses and a tool that … question in less than 45 minutes. John Aycock https://www.virusbulletin.com/virusbulletin/2013/10/
Is cybersecurity by fiat DOA? (comment); Styx exploit pack: insidious design analysis (malware analysis); Fans like Pro, too (malware analysis); Nedsym spamming (feature); Greetz from academe: On motivation (spotlight); VBSpam comparative review September…
John Aycock looks at academic focus on hackers. John https://www.virusbulletin.com/virusbulletin/2013/09/
The dying art of computer viruses (comment); Andromeda 2.7 features (malware analysis); The ZeroAccess money-generating campaign (malware analysis); The clean theory (feature); BadNews reveals ongoing challenges in the Android marketplace (feature); Greet…
John Aycock looks at malware detection using NX … John Aycock https://www.virusbulletin.com/virusbulletin/2013/08/
On the cusp of evolutionary change (comment); Alipime makes a comeback with Fujacks.CB (malware analysis); Not drowning, WAV-ing (malware analysis); Who's bad? NgrBot or SkyBot? (malware analysis); Unlocking LockScreen (malware analysis); Apktool set-up f…
John Aycock looks at the thorny issue of ethics in … security research. John Aycock https://www.virusbulletin.com/virusbulletin/2013/07/