Malware Analysis for Administrators

Saturday, March 8th, 2008

http://www.securityfocus.com/infocus/1780   1. Introduction The threat of malicious software can easily be considered as the greatest threat to Internet security. Earlier, viruses were, more or less, the only form of malware. Nowadays, the threat has grown to include network-aware worms, trojans, DDoS agents, IRC Controlled bots, spyware, and so on. The infection vectors ...

Antivirus software too inconsistent

Saturday, March 8th, 2008

Anti-virus technologies are inconsistent when it comes to identifying attacks such as worms, phishing and botnets. That's according to a report from the University of Michigan's Electrical Engineering and Computer Science Department and network security company Arbor Networks, antivirus products are inconsistent at best when it comes to identifying attacks such ...

Fake F-Secure E-Mail Contains Malware

Saturday, March 8th, 2008

A Trojan horse has been sent to e-mail addresses disguised as a message from Helsinki, Finland, antivirus software vendor F-Secure, the company said in a statement. F-Secure said that an unknown attacker sent out thousands of infected e-mail messages crafted so that they appear to be from a nonexistent F-Secure employee, ...

Five steps to make your computer more secure

Saturday, March 8th, 2008

These days, a firewall, anti-virus software and anti-spyware programs are essential, but they might not be enough to protect you. Here are five things you can do for a little added security: Leave your computer on. This is a change from an earlier recommendation that you turn it off to save ...

Worm sleeps to avoid detection

Saturday, March 8th, 2008

The latest mass-mailing worm, Atak, hides by going to sleep when it suspects that antivirus software is trying to detect it. Atak was first discovered Monday. Although antivirus companies do not expect it to cause much damage, they say it will be a nuisance because it can generate a ...