Tag: open source

  • VB2016 paper: Debugging and monitoring malware network activities with Haka

    Anyone who has ever analysed malware through its network communications will knows that this often involves ad-hoc scripts in languages like Python or Perl to decode the traffic. After all, for somewhat understandable reasons, there is no standard C&C protocol for malware. If you regularly find yourself in this situation, you may want to have…

  • VB2016 paper: Debugging and monitoring malware network activities with Haka

    Anyone who has ever analysed malware through its network communications will knows that this often involves ad-hoc scripts in languages like Python or Perl to decode the traffic. After all, for somewhat understandable reasons, there is no standard C&C protocol for malware. If you regularly find yourself in this situation, you may want to have…

  • VB2016 paper: Open Source Malware Lab

    Security experts aren’t necessarily known for being skilled at predicting the future, but if there’s one prediction they are guaranteed to get right, it’s that there will be a lot of new malware in the coming year. As a consequence, increasing numbers of companies and researchers are likely to turn their attentions to setting up…

  • VB2016 paper: Open Source Malware Lab

    Security experts aren’t necessarily known for being skilled at predicting the future, but if there’s one prediction they are guaranteed to get right, it’s that there will be a lot of new malware in the coming year. As a consequence, increasing numbers of companies and researchers are likely to turn their attentions to setting up…

  • VB2016 preview: Detecting Man-in-the-Middle Attacks With Canary Requests

    While man-in-the-middle attacks are relatively rare (especially among those not attending hacker conferences), it is quite common for computer users to be in a situation where an attacker could have an opportunity to take control of their network traffic. There are, of course, network mechanisms that seriously mitigate the risk, such as VPN or HTTPS,…

  • VB2016 preview: Detecting Man-in-the-Middle Attacks With Canary Requests

    While man-in-the-middle attacks are relatively rare (especially among those not attending hacker conferences), it is quite common for computer users to be in a situation where an attacker could have an opportunity to take control of their network traffic. There are, of course, network mechanisms that seriously mitigate the risk, such as VPN or HTTPS,…

  • Paper: All Your Meetings Are Belong to Us: Remote Code Execution in Apache OpenMeetings

    The rise of bug bounties in recent years has created an incentive for hackers to hunt for vulnerabilities in a lot of software and services. But what about those software projects that can’t pay bounties, because they are developed by volunteers? Thankfully, some researchers are devoting their time to such projects and to helping them…

  • Sourcefire turns down $186 million takeover bid

    Unsolicited offer from Barracuda Networks rejected. Sourcefire , the open source specialists behind the popular Snort intrusion prevention system and backer of the ClamAV open-source anti-malware project, has announced that it has rejected an unexpected takeover bid from anti-spam appliance specialist Barracuda Networks , claiming the rumoured $186 million offer ‘substantially undervalues’ the company’s worth.…

  • Trend vs. ClamAV patent row hots up

    Free software advocates call for boycott of Trend. With legal proceedings ongoing between Trend Micro and gateway appliance specialist Barracuda Networks , concerning Barracuda ‘s implementation of the free, open-source AV software ClamAV and Trend ‘s claims to patents on the use of anti-virus scanners to check email, a Dutch organisation promoting free and open-source…

  • Barracuda battles Trend Micro patent claims

    Trend demands licensing for gateway virus scanning idea. Barracuda Networks has announced it is fighting a legal battle against Trend Micro , who has claimed US patent rights to the concept of scanning traffic passing through network proxies for malware. A licensing issue has been running between the two firms since late 2006, when Trend…