Corpus ID: 56326700

WHATEVER HAPPENED TO THE UNLIKELY LADS? A HOAXING METAMORPHOSIS

@inproceedings{Harley2009WHATEVERHT,
  title={WHATEVER HAPPENED TO THE UNLIKELY LADS? A HOAXING METAMORPHOSIS},
  author={D. Harley and R. Abrams},
  year={2009}
}
Once upon a time the most problematic chain emails were virus hoaxes, as exemplifi ed by the Good Times hoax: however, perhaps the last really innovative malware-related hoaxes were the SULFNBK and JDBGMGR hoaxes of the early noughties. Since then, most anti-malware companies have virtually lost interest in memetic malware as its links with real, programmatic malware have declined. But does this mean the problem has gone away? Unfortunately, it hasn’t. Somewhere in the no-man’s land between… Expand
MALICE THROUGH THE LOOKING GLASS: BEHAVIOUR ANALYSIS FOR THE NEXT DECADE
Most VB attendees have a major interest in malicious code. Often they focus on the highly technical issues around the intricacies of malware technology and counter-technology, the programmatic detailExpand

References

SHOWING 1-10 OF 19 REFERENCES
MALICE THROUGH THE LOOKING GLASS: BEHAVIOUR ANALYSIS FOR THE NEXT DECADE
Most VB attendees have a major interest in malicious code. Often they focus on the highly technical issues around the intricacies of malware technology and counter-technology, the programmatic detailExpand
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in theExpand
Viruses Revealed
From the Publisher: Defend your system against the real threat of computer viruses with help from this comprehensive resource. Up-do-date and informative,this book presents a full-scale analysis onExpand
Mind Wars: Attack of the Memes
are contagious ideas, all competing for a share of our mind in a kind of Darwinian selection. Many hoaxes and their kin are Memes which are now commonly spread via e-mail and web sites. They are atExpand
Out of Africa
I spent most of December and more than half of January engaged in a series of respiratory infections that seemed to be resistant to all the antibiotics that I could find. I began to have visions ofExpand
The Meme Machine
Humans are extraordinary creatures, with the unique ability among animals to imitate and so copy from one another ideas, habits, skills, behaviours, inventions, songs, and stories. These are allExpand
Netiquette Guidelines
This document provides a minimum set of guidelines for Network Etiquette (Netiquette) which organizations may take and adapt for their own use. As such, it is deliberately written in a bulletedExpand
Hoax Viruses and Virus Alerts
  • Handbook of Information Security Vol. 3. (Ed. Bidgoli). Wiley,
  • 2006
Canning more than SPAM with Bayesian fi ltering
  • Proceedings of the 14th Virus Bulletin International Conference,
  • 2004
When is a hoax not a hoax? 2009 http://www.eset.com/threat-center/blog/?p=717
  • 2009
...
1
2
...