Call for papers
SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: firstname.lastname@example.org
Future Defenses: Technologies to Stop the Unknown Attack
Current anti-virus software serves as a reasonably good defense against the current classes of virus, worms, and script kiddies. Unfortunately current AV solutions may not be sufficient to stop a speed-optimized active worm based on a heretofore undiscovered vulnerability. This article examines three technologies that offer significant levels of protection against unknown attacks: software fault isolation, intrusion detection through program analysis, and fine-grained mandated access controls.
Heuristic Techniques in AV Solutions: An Overview
Heuristic technologies can be found in nearly all current anti-virus (herein referred to as AV) solutions and also in other security-related areas like intrusion detection systems and attack analysis systems with correlating components. This article will offer a brief overview of generic heuristic approaches within AV solutions with a particular emphasis on heuristics for Visual Basic for Applications-based malware.
"Holistic" Enterprise Anti-Virus Protection
If it wasn't apparent at the beginning of 2001, it was certainly clear by the end of the year: enterprises worldwide must take a holistic approach to virus protection if they are going to get the threats under control. Rolling out desktop protection and expecting the end users to keep it up to date is obviously not going to work. This article will explore some strategies that can be used to help keep your enterprise relatively virus-free.
Palm OS: a Platform for Malicious Code? Part Two
This is the second of a two-part series that will attempt to establish to what degree Palm OS-based systems represent a suitable platform for malicious code. The first article examined the operating system in general, as well some of the types of malicious code that could be used to infect Palm OS platforms. This installment will look at file system viruses, non-overwriting link viruses, compressing link viruses, existing ...
Palm OS: A Platform for Malicious Code? Part One
Since its introduction several years ago, only four malicious programs have been seen for the Palm-OS platform. This article is the first of a two-part series that will attempt to establish to what degree Palm OS-based systems represent a suitable platform for malicious code. This installment will examine the operating system in general, as well some of the types of malicious code that could be used to infect Palm OS platforms.
A Brief History of The Worm
In the past few years, with the widespread adoption of the Internet, worms and viruses have become serious pests: spreading around the world in a matter of hours with the capacity to carry highly damaging payloads. Such malware is growing more sophisticated, as the authors of new worms learn from the successes and mistakes of the past. This article will take a brief look at the evolution of worms and other malware, in an attempt to better understand how we got to where we are today.
Comparing E-mail Server Virus Protection Solutions, Part Two
This is the second of a two-article series that is intended to help readers assess and evaluate anti-virus (AV) solutions. The first articlelooked at how users should assess their AV needs, as well as recommending a few features to look for in AV software. In this installment, we will take a look at AV product reviews and explore how users can evaluate AV products for themselves.
Comparing E-mail Server Virus Protection Solutions, Part One
So you've been assigned the task of selecting virus protection for your messaging and groupware server. Or maybe you already have a solution in place, but are having second thoughts because your organisation seems to be disrupted by new viruses more than it should be. This article is the first of a two-part series that is intended to help readers assess and evaluate AV solutions. This installment will help readers to assess their AV needs and point out a few things to look for in AV product...
Macro Virus Protection in the Microsoft Office Line, Part Two
This is the second of a two-part series discussing some of the macro viruses that have targeted MS Office products. The first article looked at the macro viruses that affected earlier Microsoft Word and Office products. In this installment we will examine MS Office 2000, the new version of Microsoft Office, code named Office XP, and Outlook.
Macro Virus Protection in the Microsoft Office Line, Part One
The Microsoft Office programs are the most well known and widely-used programs in the world. They are also the most vulnerable targets for macro virus infection. This is the first of two articles that will review some of the macro viruses that have targeted MS Office products. This series will also analyze some of the efforts made by Microsoft to contain the macro virus situation and attempt to point out what they did right and what they did wrong. This article will look at some of the ea...