Actually the email itself will be blocked not only the word document attached to it since it too could contain an exploit... hooray.
Also keep in mind that a snapshot won't prevent your private data being sent out to the net (be it passwords, logged keystrokes, your webscam...
lol, the wildlist alone has 766 entries at the moment. VB may use less samples than Marx or Clementi, but not THAT few. In addition to the...
Executable code or shell code in general does not have anything to do with MZ or PE Headers or any other file type for that matter. It's simply...
No to both of your questions. There are also exploits that do not contain executable code, and it is not easy to find executable code in arbitrary...
If you want to wait a few years for your AV to break the AES encryption of your RAR archives.... RAR uses strong encryption, so unless you use...
Re: AV-Comparatives June Results (Retrospective / Proactive Tests) Rejzor: What makes you draw the conclusion that FPs in legit files are not...
Re: AV-Comparatives June Results (Retrospective / Proactive Tests) Rejzor: I'm not quite getting your conclusion from cracks getting detected...
Probably a copy paste error, the german description is correct and does not say it contains a firewall.
Re: AV-Comparatives June Results (Retrospective / Proactive Tests) The Hammer: AFAIK VB doesn't count suspicious detections (heuristics are...
1) he's a VXer freely exchanging stuff with anyone who can provide him with more samples, that alone is unprofessional and as such an "attitude"...
Durad: av-test is THE most reputable test centre out there, they employ 15 people not doing this as hobbyists but as their main job for years...
back up again
Anywaaay, sleeping time now. Wanna buy some rare books tomorrow early in the morning :) At least those don't contain exploits that endanger the...
Yikes, Lucas was faster than me :)
Read the following paper as an example: http://taviso.decsystem.org/virtsec.pdf There are a few more issues like the ability of the VM Guest...
Damn I had a long reply on your post, but closed the wrong window. I'm only giving a short comment instead now since it's getting late here.......
This may be a bit far fetched, but organized crime being on the rise with malware/fraud and the money losses caused to them by security vendors...
I think Malware Authors DO give much thought on how hard it is for security vendors. It's part of the problem :)
Would you prefer them to lie so you can sleep better? I'm not saying they're not doing anything, I'm saying that the work never ends. There is no...
solcroft: I'm still feeling I pissed you off personally, that has not been my intention. I am not sure what cases of reasonable responses you may...
So would an answer along the lines of "Yup, we know. We are working on something." be satisfactory to those asking these questions? What do you...
Repeatedly stating the obvious is a waste of time. Telling everyone exactly what they're doing every time someone asks about "doing something...
Let us face a few things: - It is always easier to demand a solution to a problem, than to come up with one. - It is always easier to come up...
lucas1985: For executables that depends on the method used for doing the whitelisting. However whitelisting is by default still vulnerable to...
Separate names with a comma.