No comments allowed

Comments are not allowed for this article.



Blog

Paper: a timeline of mobile botnets

Ruchna Nigam provides an overview of more than 60 mobile malware families.
30 March 2015

Paper: Dylib hijacking on OS X

Patrick Wardle shows how OS X is also vulnerable to once common Windows attacks.
19 March 2015

Will DIME eventually replace email?

Protocol has all the advantages of email, yet is orders of magnitude more secure.
12 March 2015

Paper: Windows 10 patching process may leave enterprises vulnerable to zero-day attacks

Aryeh Goretsky gives advice on how to adapt to Windows 10's patching strategy.
12 March 2015

The ghost of Stuxnet past

Microsoft patches .LNK vulnerability after 2010 patch was found to be incomplete.
11 March 2015

Virus Bulletin seeks hackers, network researchers for VB2015

One week left to submit an abstract for the 25th Virus Bulletin conference.
06 March 2015

Subscribe | View All

Twitter Feed

virusbtn:From yesterday: A timeline of mobile botnets. Paper by @_r04ch_ https://t.co/7wPaWqMp4C
Tue Mar 31 08:06:55


virusbtn:Dealing with very large PCAP files? Why not turn them into XML or SQLite https://t.co/6KyQpgYpKK
Tue Mar 31 07:41:39



Advertisement
Global Forum on Cyber Security for Financial Secto