lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200601101752.k0AHqAqi003203@mailserver2.hushmail.com>
Date: Tue, 10 Jan 2006 09:52:05 -0800
From: "Dancho Danchev" <dancho.danchev@...h.com>
To: <bugtraq@...urityfocus.com>
Subject: Malware - future trends


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi folks,

I have recently conducted an independent research on the current,
and future trends on the malware scene. Basically, my publication
answers, what are the driving forces behind the rise of malware?
Who’s behind it, and what tactics do they use? How are vendors
responding, and what should organizations, researchers, and end
users keep in mind for the upcoming future?

Its purpose is to assist in more constructive discussions on the
topic, and speculate on the future. Feedback is greatly
appreciated.

http://www.infosecwriters.com/text_resources/pdf/malware_DDanchev.pd
f

Cheers,
Dancho
- --
"Security is Futile"
http://ddanchev.blogspot.com/
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.4

wkYEARECAAYFAkPD9EQACgkQ0Thnod9OjW8+egCgjvG0ztS8zOr+1rFZ9cTwJy7JNJEA
n1Q5KsIHNq1MOg7v6QvinC7WfjNv
=1/os
-----END PGP SIGNATURE-----




Concerned about your privacy? Instantly send FREE secure email, no account required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ