A look back at how ransomware – a type of malware used mostly for hijacking user data – has evolved from the days of PC Cyborg to today’s service for sale.
The risks of using government use of malicious code in cyber conflict are examined in this paper by Andrew Lee and Stephen Cobb: Malware is called malicious for a reason: the risks of weaponizing code.
In response to recent reports that malicious apps may have made their way into the official Android Market, Google has responded by announcing a new program to more proactively scan the Market and developer accounts for seemingly malicious apps and highlights and/or remove them before users experience trouble. Traditionally, the barriers of entry for developers
Have you checked our white papers page at https://www.welivesecurity.com/papers/conference-papers/ lately? We’ve recently put up a paper by Jeff Debrosse and David Harley that was presented at the 19th Virus Bulletin Conference in Geneva in 2009, and called “Malice Through the Looking Glass: Behaviour Analysis for the Next Decade“. The paper whttp://www.eset.com/download/whitepapers/Harley-Debrosse-VB2009.pdfhttps://www.welivesecurity.com/media_files/white-papers/Harley-Debrosse-VB2009.pdfas first published in Virus Bulletin