An analysis of real-world effectiveness of reputation-based security
|
Symantec
|
Last-minute paper: Dialers are back, and this time they're on smartphones!
|
F-Secure
|
On scanning the Internet or the curse of in-the-cloud URL scanning
|
|
Last-minute paper: Unravelling Stuxnet
|
Holly Stewart
,
Microsoft Corporation
|
'Want my autograph?': The use and abuse of digital signatures by malware
|
Sophos
|
Bypassing defences - when old tricks work in Windows 7
|
|
Large-scale malware experiments, why, how, and so what?
|
Joan Calvet
,
Pierre-Marc Bureau
,
LORIA
,
ESET
|
P0isoning the social web
|
Dan Hubbard
|
Victims of friendly fire
|
|
Automated targeted attacks: the new age of cybercrime
|
Kaspersky Lab
|
Waste management: the current state of sample sharing
|
McAfee
|
Industry testing and telemetry sharing
|
Tony Lee
,
Microsoft Corporation
|
High speed JavaScript malware sandbox
|
|
The age of Russian trojan-ransoms
|
Kaspersky Lab
|
Gaming the gamers: tricks of the trade in the world of PWS warcraft
|
Microsoft Corporation
|
Threats to the Social Web
|
Facebook
|
Why your AV solution is ineffective against today's email-borne threats
|
|
Cyberterrorism: oh really?
|
Trend Micro, Inc.
|
Blackhat SEO: abusing Google Trends to serve malware
|
|
Standards and policies on packer use
|
Igor Muttik
,
Sophos
|
The psychology of spamming
|
Microsoft Corporation
|
Russian cybercriminals on the move: profiting from mobile malware
|
Kaspersky Lab
|
The difference between false positives and FALSE POSITIVES
|
|
Targeted malware attacks: then and now
|
iSIGHT Partners
|
Windows 7 impact upon rogue security software
|
iSIGHT Partners
|
Categorizing the entire web with autonomous system numbers
|
Dan Hubbard
|
Social engineering trumps a zero-day every time
|
|
Challenging conventional wisdom on byte signatures
|
Thomas Dullien
,
Ero Carrera
|
Finding rules for heuristic detection of malicious PDFs: with analysis of embedded exploit code
|
Sophos
|
SMS spam detection by operating on byte-level distributions using Hidden Markov Models
|
|
Last-minute paper: Life on stolen land
|
Avast Software
|
Last-minute paper: Intrusions and inside jobs: lessons from the banking industry
|
|
Last-minute paper: The ROP pack
|
Kaspersky Lab
|
Last-minute paper: Alureon: the first 64-bit rootkit
|
Microsoft Corporation
|
The Webwail botnet: a reputation-based filter killer
|
Xu
,
Fortinet, Inc.
|
Play by the rules? Should AV be enforcing the rules to prevent uncontrolled obfuscation by malware?
|
McAfee
|
P2P as a corporate persona non grata
|
|
Last-minute paper: An indepth look into Stuxnet
|
Symantec
|
Kisswow: the OnlineGames gang
|
iSIGHT Partners
|
Sneaky Mac OS X threats
|
|
Last-minute paper: Caution: level Pegel. The ideal computer infecting scheme.
|
Kaspersky Lab
|
Still curious about anti-spam testing? Here's a second opinion
|
|
Attacks from the inside...
|
|
How much do you cost? The black market price of your digital data
|
Kaspersky Lab
|
AV testing exposed
|
ESET
|
Panel discussion: Social networks and computer security
|
|
The Skype is no longer the limit - new ways malware keeps in touch with your friends
|
Microsoft Corporation
|
Observations and lessons learned from comparing point-in-time cleaning against real-time protection
|
Microsoft Corporation
|
Case study - successes and failures apprehending malware authors
|
|
Zero-day malware
|
Igor Muttik
,
McAfee
|
The Mariposa effect
|
|
Size matters - measuring a botnet operator's pinkie
|
Gunter Ollmann
|
Experiences in malware binary deobfuscation
|
|
Call of the WildList: last orders for WildCore-based testing?
|
Andrew Lee
,
ESET
|