This paper discusses a range of issues, from various blatant online scams to applications that are less useful than they first seem. The common factor is selling a pig in a poke to trusting computer…
The author says Win32/Kelihos is a separate malware family from Win32/Nuwar and Win32/Waledac because code and binaries are different. Author concludes that we should classify all three families as…
First predicted in 2010, TDL4 (Win32/Olmarik) has been evolving since 2011. Its developers attempted to bypass the KB2506014 security update, which addressed a vulnerability allowing abuse of WinPE…
This document describes the way desktop threats have moved to mobile and become increasingly widespread. With the greater use and sophistication of mobile devices, we will see a resurgence of old…
Roundtable participants in the Daily Transcript discuss the current state of cyber security and the way cyber warfare is developing. Some speculate that with the San Diego defense industry's efforts…
In an article titled "Phish Phodder: Is User Education helping or hindering?" David Harley addresses why and how phishing works, showing clear and convincing indicators to raise awareness and…