Password sweepstakes (comment); Chat-and-paste (malware analysis); MultiPlatform Madness! (malware analysis); Greetz from academe: Content-Agnostic Malware Protection (spotlight); Java: setting security manager to null (feature); Bitcoin mining: investing…
Malware Protection. John Aycock https://www.virusbulletin.com/virusbulletin/2013/06/
John Aycock takes the controversial view that Stuxnet is really not that interesting at all. He outlines what makes a piece of malware a game‑changer and explains why last year’s headline hitter is not worth writing home about.
John AycockUniversity of … Helen Martin Abstract John Aycock takes the controversial view that Stuxnet is https://www.virusbulletin.com/virusbulletin/2011/09/stux-rut-why-stuxnet-boring/
Should there be an AV industry code of ethics? (comment); 'Holey' virus, Batman! (malware analysis); Qakbot: a disaster waiting to happen (feature); Hearing a PIN drop (feature); Stux in a rut: why Stuxnet is boring (opinion);
why Stuxnet is boring John Aycock takes the controversial view that Stuxnet is … hitter is not worth writing home about. John Aycock https://www.virusbulletin.com/virusbulletin/2011/09/
Richard Ford and William Allen, both teachers of malware courses at Florida Institute of Technology, present their views on the teaching of virus writing as part of security courses.
Dr John Aycock put himself firmly in the industry’s cross … readers have had the opportunity to meet Dr Aycock at Virus Bulletin … his classes or by any of his students. Dr Aycock’s class was not the first example of https://www.virusbulletin.com/virusbulletin/2008/09/malware-teaching-considered-harmful/
Research into future security threats is not always taken kindly by all members of the anti-virus community. Understanding the bounds of security research is important, however, when there is an increasing emphasis on proactive rather than reactive defenc…
John Aycock Department of Computer https://www.virusbulletin.com/conference/vb2007/abstracts/future-threats/
Securing the Web 2.0 (comment); ANI-hilate this week (analysis); Beyond Virtu(e) and evil (analysis); Nirbot: targeted attacks get personal (analysis); Covert zombie ops (feature); Trend Micro PC-cillin Internet Security 2007 (product review)
John Aycock considers how such a botmaster’s command … might look. John Aycock https://www.virusbulletin.com/virusbulletin/2007/05/