Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT
ADVERTISEMENT

Links 1 through 10 of 46 by Justin Mason tagged malware

'Haaretz reports [on a] video that was played at a party organized for General Gabi Ashkenazi's last day on the job. The video contained references to the successes he achieved during his stint as chief of staff, [including] the Stuxnet worm attack on Iran's uranium enrichment facility at Natanz and and the nuclear reactor at Bushehr.'

Share It With Others!

interesting post from Nate Lawson -- he suggests that Stuxnet could have been much better in payload obfuscation, had the authors studied the state of the art in malware implementation.  I'm not convinced, however; as Halvar Flake suggests, KISS applies

Share It With Others!

'Stuxnet is a new Internet worm that specifically targets Siemens WinCC SCADA systems: used to control production at industrial plants such as oil rigs, refineries, electronics production, and so on. The worm seems to uploads plant info (schematics and production information) to an external website. Moreover, owners of these SCADA systems cannot change the default password because it would cause the software to break down.'

Share It With Others!

on average across the AV industry, 40% block rates just after 0-hour of a new malware sample, rising to 60% after 5 days. sounds like the AV industry is losing, if this chart is valid. (via Terry Zink)

Share It With Others!

'[Joe] Stewart said the sophistication and stealth of this malware strain has become so bad that it's time for Windows users to start thinking of doing their banking and other sensitive transactions on a dedicated system that is not used for everyday Web surfing.' it's that bad

Share It With Others!

application of the BLAST pattern-discovery algorithm to malware. interesting, I should take a look to see if I can steal any bits for my "BLAST applied to anti-spam" code ;) (via adulau)

Share It With Others!

paperghost strongly doubting that Matt Knox was quite so squeaky-clean as his recent interview would suggest

Share It With Others!

great interview. 'In your professional opinion, how can people avoid adware?' 'Um, run UNIX.'

Share It With Others!

0.6% of malware files reported to MS, ~135000 files, had valid PKI code signatures

Share It With Others!

about time! This has been necessary for ages. It will, of course, eat McAfee/Symantec/et al's lunch on a huge scale; I guess that was probably the issue

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT