The AVAR 2012 Annual Conference (The 15th Asia Anti-Virus Security Conference) was held in West Lake, Hangzhou on November 13th and 14th in 2012. Several technical directors and technicians of Antiy Labs attended it. Tong Zhiming and Kang Xuebin, who come from the Anti-virus Engine R&D Center ……
The group of MUTE (Malicious URLs Tracking and Exchange) was founded in 2008 to facilitate the exchange of malicious URLs between trusted security researchers. The MUTE’s mission is to minimize the exposure of end users from computing threats through timely tracking and exchange of URLs (mal……
Abstact: Malware has developed and broke through the traditional single concept of program code. It has penetrated into the whole system of society, politics, economy and life. It is impossible to resist malware effectively only relying on anti-virus vendors. The battle against malware requ……
Abstact: The status of malware, similar to that of the living creatures, is the result of the comprehensive elimination and selection. Actually, it is the same with all the software programs. Fundamentally speaking, the theory of evolution is a science on life-death and evolution. Bot……
Abstact: A honeypot is a security resource that can be scanned, attacked and compromised. This presentation systematically summarized the development and status quo of Honeypots, as well the technical challenges researchers face. In the final part, the writer explores the Honeypots’ potentia……
Abstact: This presentation focuses on data storage and security strategies in terms of network identity security. In the beginning, some background about the topic is introduced. Then, the writer summarizes the methods used in cipher text attacks and the current solutions. In the final,……
Abstact: This presentation explores the challenges anti-virus engines, products and systems face. In many cases, the security products are no longer the credible dams when facing with the surging malware waves; they become the trembling islands that are vulnerable sometimes. Time Top……