Fachbeiträge

Hier finden Sie eine Reihe von technischen Fachbeiträgen für Systemadministratoren und Sicherheitsspezialisten zu unterschiedlichsten Themenbereichen in englischer Sprache. Einige dieser Fachbeiträge wurden auf Sicherheitsseminaren und Fachkonferenzen weltweit präsentiert.

Popureb - A small rootkit with a big reputation

New rootkits always garner attention from the malware research community and often panic among end-users. This paper dissects the workings of Popureb and explains how to safely restore affected computers to their original state.

What is Zeus?

This paper will explore the various components of the Zeus kit from the Builder through to the configuration file; examine in detail the functionality and behaviour of the Zbot binary; and assess emerging and future trends in the Zeus world.

Want my autograph? The use and abuse of digital signatures by malware

This paper discusses the abuses of digital signatures and possible approaches to turn the criminals' investment in their fraudulent reputation into additional protection mechanisms.

This paper was presented at Virus Bulletin in Vancouver, 2010

Finding rules for heuristic detection of malicious PDFs: With analysis of embedded exploit code

This paper, presented at Virus Bulletin 2010 in Vancouver, shows tips and tricks to help with classification and detection of malicious PDFs.

This paper was presented at Virus Bulletin in Vancouver, 2010

Malware with your Mocha? Obfuscation and antiemulation tricks in malicious JavaScript

Fraser Howard of SophosLabs describes the tactics that attackers use to hide malicious JavaScript from detection and analysis.

Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware

Fraser Howard and Onur Komili of SophosLabs describe in this paper recent research by SophosLabs into how attackers are using blackhat Search Engine Optimization (SEO) techniques to stuff legitimate websites with content designed to rank highly in search engine results, yet redirect users to malicious sites.

The Partnerka — What is it, and why should you care?

In this paper Dmitry Samosseiko of SophosLabs Canada discusses and analyzes the Russian 'partnerka' networks, their economic model, and their relation to spam and malware. It will reveal some ‘insider’ statistics and information, show the tools used for ‘black SEO’ (search engine optimizations), and explain its terminology and techniques. This technical paper also discusses how traditional email spam evolved into a complex web-based industry, creating new challenges for law enforcement, user education and for security labs.

This paper was presented at the Virus Bulletin Conference in Geneva, 2009.

10 steps to better secure your Mac laptop from physical data theft

This paper describes the steps that Mac users can take to improve the physical security of their laptops — away from the safety of the corporate environment with its security controls and into new environments with new risks and threats — discussing the context and benefits of each change.

Securing websites

In this paper Chris Mitchell, Virus Analyst at Sophos, discusses some of the common ways that web servers are attacked, the reasons why they are targeted, and details various techniques in which they — and the websites they host — can be protected.

Modern web attacks

In this paper, Fraser Howard, principal virus researcher at Sophos, explores how modern malware uses the web to infect victims. The increased use of compromised websites in attacks is discussed and illustrated with examples of real attacks. Finally, methods to defend against such attacks are discussed.

The game goes on: An analysis of modern spam techniques

This paper analyses the many modern anti-anti-spam techniques, with statistical reports and real-life examples. Methods of combating these often highly effective and 'popular' spam techniques are explored.

This paper was presented at the VB Conference 2006

Can strong authentication sort out phishing and fraud?

Leading anti-malware expert, Paul Ducklin, addresses the following questions: can strong authentication (especially so-called two factor authentication) sort out phishing and fraud? Will smarter technology leave us safe from organized crime, or are there aspects of phishing and on-line fraud which will allow the bad guys to keep stealing from unfortunate victims no matter what we do?

This paper was presented at the VB Conference 2006

The challenge of detecting and removing installed threats

In this paper, Jason Bruce, Detection Development Manager at SophosLabs, discusses scanning techniques for detecting and removing threats that have been installed on computers, with a focus on the difficulties faced in removing threats that are comprised of many installed components. Jason concludes by highlighting that the measure of success of threat removal is not always as clear cut as the measures used in the detection tests the industry has become used to.

This paper was presented at the VB Conference 2006

download Kostenloses Virus Removal Tool downloaden
Finden Sie heraus, an welchen Punkten Ihr Anti-Virus versagt hat.