ICSA Labs Blog: Anti-Malware

When Ages and Revolutions Converge

As this is my first post on ICSA Labs’ blog, I thought I’d take a little bit of time to explain how I currently see the malware world. For those who don’t know me, I’ve been dealing with viruses and assorted malware since 1987, which is about when the first viruses appeared.

Clickmania – An Internet Disease with a Cure

Will you succumb to Clickmania?? I define this horrible Internet disease as the uncontrollable need to “click” your mouse on every picture of a world disaster, Royal Wedding, Osama bin Laden, nuclear reactor explosion, or Hollywood star in trouble with the law today on Facebook or Twitter.  

Verizon Launches 2011 Data Breach Investigation Report – What Does It Mean for You?

On April 19, Verizon issued its much-anticipated 2011 Data Breach Investigations Report (DBIR).  This report has become the seminal report for the security community, and is eagerly awaited for each year. 

Some key takeaways from this year’s report:

3 Tips for Avoiding Malware at Home

Educating consumers on safe computing practices is a real passion of mine. In the video embedded below, I cover three of the most important tips for creating a safe computing environment at home. 

Confused about new Texas Law, Title 10, Section 2059.060? Read the law itself.

The state of Texas recently had a law go into effect (on Dec. 1, 2010) that impacts the security product testing industry, including ICSA Labs.  The law has attracted a significant amount of attention, some of which is inaccurate. 

The law—and the administrative code that provides rules on implementation—includes a section that clearly and succinctly defines terms.  I encourage you to read the law yourselves, quotations and links provided below. 

Stuxnet Worm: Facts First

Stuxnet is a family of multi-component malware that spreads via removable drives.  It was apparently created in 2009 but was first detected in June 2010 by a security firm based in Belarus.  Due to the complexity and sophistication of Stuxnet, it has proven to be difficult and time consuming to analyze in detail.  Interesting details from several researchers have been reported in the media in the past few days and have gaine

Trojans and Worms and Botnets, Oh My!

Today we put out a press release with tips on how users can use their favorite social media sites - like Facebook, Twitter and LinkedIn - without compromising their personal information.

Don’t get fooled again

Don’t be fooled by the latest round of “rogue” anti-virus products.  Typically rogue anti-virus products attempt to tell you that your PC is infected (when it’s not) and social engineer you into buying the rogue anti-virus product under the guise of cleaning up the problem.

The (malware) gift that keeps giving…

It’s pretty simple. If you are going to distribute any computer media to anyone, at anytime, it’s best to scan it with an ICSA Labs Certified Anti-Virus Product before you distribute it.  You can find a list of certified Anti-Virus products here.

Pick a holiday…any holiday

If there is a reason for celebration, a time to get together, a holiday or major news story,  expect the malware writers to take advantage of the technically disadvantaged by creating and distributing spam or malware with some reference or association to that event.  Let’s take the recent report in Infosecurity of hackers spreading fake anti-