This paper provides an overview of the KeyBase trojan, both the keylogger itself and the server-side management component. Additionally, we will look at an example of when this trojan was used.
Have you heard the one about the computer user who used their pet’s name as their password? Just like jokes, it seems the old ones and the obvious ones are considered the best when it comes to users selecting their passwords. Martin Overton looks at…
No malware author wants their piece of code to be easy to detect. Over time, several different approaches have been put into action to detect malware, and in response, malware authors have put into action different methods of evading them. This paper…
In 2001, ‘Code Red’ caused White House administrators to change the IP address of the official White House website, and even penetrated
the mighty Microsoft’s own IIS servers. In August 2001, Costin Raiu
analysed the Win32/Bady.worm,
This month, the VBSpam test team put 17 full email security solutions to the test, together with four DNS-based blacklists. All 17 products achieved a VBSpam award for their efforts, with no fewer than nine of them performing well enough to achieve a…