AV program-savvy hackers

Dunham, Ken
December 2006
SC Magazine: For IT Security Professionals (UK Edition);Dec2006, p11
The article focuses on VeriSign iDefense, which was used to scan malicious codes. The codes were tested by hackers and attackers against the top AV engines to ensure that their creations are undetectable before releasing them. New creations were uploaded to free online web scanners. Through this strategy, they can create variants that are undetectable by AV software faster than vendors and deploy new signatures. The test showed that none of the programs considered was 100 percent effective on its own.


Related Articles

  • Matt Hines: Security Watch.  // eWeek;10/6/2008, Vol. 25 Issue 28, p49 

    The article presents a commentary on the implications of malware attacks in the U.S. which was posted on the web as blog. The author asserts that constant election campaign of presidential on various media types has increased the number of cyber-criminals and hackers which aims to make money by...

  • CRIMINAL ACTIVITY STILL ON INCREASE. Kelly, Benedict // Finweek;10/11/2007, p73 

    The article reports that the tools that enable hackers to plant software on multiple computers are now available as a complete system, allowing people with limited skills to initiate attacks and control compromised computers. According to the report from Symantec Corp. Internet Security Threat,...

  • Windows Flaw Greets New Year. Perez, Juan Carlos // InfoWorld;1/2/2006, Vol. 28 Issue 1, p11 

    This article reports on a warning given by security firms regarding the vulnerability of patched systems running Windows XP and Windows Server 2003 to malicious hackers as of January 2006. A flaw was discovered on how the two Windows versions handle .WMF or Windows Metafile graphic files. The...

  • Harnessing SCADA without undermining security. Whitlock, Steve // Journal: American Water Works Association;Jul2004, Vol. 96 Issue 7, p51 

    Discusses ways to take advantage of the benefits of a supervisory control and data acquisition (SCADA) system while keeping it safe from hackers. Challenges associated with the implementation of SCADA; Factors to consider in selecting the right system; Potential security problems facing both...

  • User Discovers Office 2008 Problems. Frakes, Dan; Griffiths, Rob // Macworld;Apr2008, Vol. 25 Issue 4, p30 

    The article presents information on installation-related problems associated with Microsoft Office 2008 from Microsoft Corp. The problems are stated to be associated with security and administrative trouble. The software creates problems related to file ownership and the UID 501 and UID 502...

  • SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES. Te-Shun Chou // International Journal of Computer Science & Information Technolo;Jun2013, Vol. 5 Issue 3, p79 

    Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications, development of customized computer software, and creation of a "realistic" network environment. In...

  • Backdoor Bedlam. Mimoso, Michael S. // Information Security;May2008, Vol. 11 Issue 4, p8 

    The article discusses backdoors in computer systems which are inserted by developers for support purposes but could present attackers with a cheaper means of malware distribution and system access. Some backdoors contain a hidden functionality or invisible parameters in web applications that are...

  • Firm's software targets viruses.  // New Hampshire Business Review;2/18/2005, Vol. 27 Issue 4, p40 

    Features the new software product introduced by Manchester, New Hampshire-based firm, Interpose LLC in early 2005, designed to combat computer viruses and the hackers who develop them.

  • Return of the Web mob. Naraine, Ryan // eWeek;4/10/2006, Vol. 23 Issue 15, p11 

    The article focuses on the resurgence of computer hackers in the U.S. This new breed of hackers are equipped with more sophisticated and advanced technology to disrupt the Internet. Skilled hackers steal corporate data including credit card and bank accounts. Some hackers use their ability in a...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics