Virus Bulletin

Displaying 1-4 of 4 results

  • White Papers // Apr 2009

    Mail Authentication With Domain Keys Identified Mail - Part One

    Message authentication is a promising technique that can be used to help separate wanted email from unwanted email, and Domain Keys Identified Mail (DKIM) is an authentication technique that seems likely to gain wide acceptance. John Levine looks at what message authentication is and how DKIM works. Message authentication is...

    Provided By Virus Bulletin

  • White Papers // Dec 2008

    Fighting Phishing at the Browser Level

    Phishing can no longer be considered a new and emerging phenomenon. Fake websites impersonating both national and international financial institutions appear everywhere, trying to manipulate users into giving away their credentials. This paper describes a method that attempts to deal with the phishing problem at the browser level, by combining...

    Provided By Virus Bulletin

  • White Papers // Oct 2008

    The (Life And) Death of the Pattern File

    A recent paper makes a point of claiming that the anti-virus industry and anti-virus products are no longer an acceptable whole solution. The fact that those of inside this industry haven't made pure AV scanners in more than a decade is apparently beside the point. The author then goes on...

    Provided By Virus Bulletin

  • White Papers // Oct 2008

    Stormy Weather: A Quantitative Assessment of the Storm Web Threat in 2007

    The mixed web threat known as Storm is widely acknowledged as the most significant digital security event of 2007. Storm combines the global epidemic aspects of traditional viruses and worms with the stealth and economic activity of today's massive botnets. Historically, malware outbreaks have been fast-spreading, single-purposed and soon over....

    Provided By Virus Bulletin

  • White Papers // Oct 2008

    The (Life And) Death of the Pattern File

    A recent paper makes a point of claiming that the anti-virus industry and anti-virus products are no longer an acceptable whole solution. The fact that those of inside this industry haven't made pure AV scanners in more than a decade is apparently beside the point. The author then goes on...

    Provided By Virus Bulletin

  • White Papers // Oct 2008

    Stormy Weather: A Quantitative Assessment of the Storm Web Threat in 2007

    The mixed web threat known as Storm is widely acknowledged as the most significant digital security event of 2007. Storm combines the global epidemic aspects of traditional viruses and worms with the stealth and economic activity of today's massive botnets. Historically, malware outbreaks have been fast-spreading, single-purposed and soon over....

    Provided By Virus Bulletin

  • White Papers // Dec 2008

    Fighting Phishing at the Browser Level

    Phishing can no longer be considered a new and emerging phenomenon. Fake websites impersonating both national and international financial institutions appear everywhere, trying to manipulate users into giving away their credentials. This paper describes a method that attempts to deal with the phishing problem at the browser level, by combining...

    Provided By Virus Bulletin

  • White Papers // Apr 2009

    Mail Authentication With Domain Keys Identified Mail - Part One

    Message authentication is a promising technique that can be used to help separate wanted email from unwanted email, and Domain Keys Identified Mail (DKIM) is an authentication technique that seems likely to gain wide acceptance. John Levine looks at what message authentication is and how DKIM works. Message authentication is...

    Provided By Virus Bulletin