The other week I blogged about the newly accepted AMTSO documents. In three quick blog posts I’ll go through all the documents individually in some more detail and why they are important. Read Full Article
Cybercrime and the law: a review of UK computer crime legislation
At various times over the last few years, we’ve posted comments on different aspects of UK computer crime legislation, and the policing of cybercrime, on our weblog. Read Full Article
German spammers hooked on Christmas
It’s already May and almost half a year since Christmas. There’s more than six months until next Christmas Read Full Article
Live from Interop Las Vegas
I’m at the Interop Las Vegas show which is again taking place in the Mandalay Bay convention center. This is my first time in Vegas and I’m finding it quite the experience. Read Full Article
Classmates
Last week there was a lot of media attention devoted to a phishing attack on Facebook Read Full Article
AMTSO & CARO May 2009
During the first full week of May a portion of the AV researcher community gathered in sunny Budapest, Hungary. The first order of business was attending the third annual CARO workshop. The workshop was attended by more than one hundred researchers from all over the globe. Read Full Article
Another infected device
Another infected device Read Full Article
And the winner is…
And the winner is… Read Full Article
The myth of *nix security
It’s often argued that *nix systems are secure, and there aren’t any viruses or malware for such systems. This hasn’t been true for a long time, as two recently detected malicious programs prove. Read Full Article
Spam evolution: January – March 2009
During Q1 2009, spam accounted for 86.8% of all mail traffic which is 5% higher than the average amount of spam in 2008. However, this is not an indicator of an increase in spam in mail traffic. Read Full Article