//
archives

Archive for

Kaspersky source leak confirmed

Kaspersky AV[2] source code has been leaked on several torrent sites, confirms the Russian software firm. The source code is dated 2008, possibly Version 8. The effect current versions is said to be minimal as no common AV related code exists. The confirmation was sent in a statement to Tech Blog Giant Softpedia[1]. However, having … Continue reading

Antivirus Source Leaked

According to Softpedia[1] the Kaspersky AV[2] source code has been leaked on several torrent sites. The Source appear to be dated 2008, possibly Version 8. The effect current versions (called 2011 or PURE) is not established. There is no comment available from Kaspersky yet. References [1]Softpedia 29/01/2011 [2] Kaspersky Labs 29/01/2011 – Posted using BlogPress … Continue reading

Ideals in IT Security

We are all aware of ever increasing weight of assaults on IT systems. From simple spam through to complex Stuxnet the problem is ever changing, ever increasing. And the malefactors are evolving faster than the benefactors.

Analysis of a Malware attack

Here’s a good example of how malware is written to exploit “holes” in software in unexpected ways and how complexly they can be hidden, onion layers. analysis-targeted-trojan Well written by Martin Lee, Senior Software Engineer, Symantec.cloud with contributions from Anoirel Issa and Joseph Rabaiotti – Posted using BlogPress from my iPhone

Web Security

The fourth article in my series on web security concentrates on Custom Proxies. A custom proxy uses simpler, easily available software to provide a gateway to the Web for all users. Custom Proxies This is both the simplest and the more difficult of all the solutions to put in to production. It’s the simplest as … Continue reading

Categories

RSS This Blog…

  • An error has occurred; the feed is probably down. Try again later.

Share me…

Bookmark and Share

Twitter Updates

January 2011
S M T W T F S
« Dec   Feb »
 1
2345678
9101112131415
16171819202122
23242526272829
3031