Antiy Labs Joins AVAR

The AVAR 2012 Annual Conference (The 15th Asia Anti-Virus Security Conference) was held in West Lake, Hangzhou on November 13th and 14th in 2012. Several technical directors and technicians of Antiy Labs attended it. Tong Zhiming and Kang Xuebin, who come from the Anti-virus Engine R&D Center ……

Continue Reading

Antiy Becomes MUTE Member

The group of MUTE (Malicious URLs Tracking and Exchange) was founded in 2008 to facilitate the exchange of malicious URLs between trusted security researchers. The MUTE’s mission is to minimize the exposure of end users from computing threats through timely tracking and exchange of URLs (mal……

Continue Reading

Malware in Mobile Platform from Panoramic Industrial View

Abstact: Malware has developed and broke through the traditional single concept of program code. It has penetrated into the whole system of society, politics, economy and life. It is impossible to resist malware effectively only relying on anti-virus vendors. The battle against malware requ……

Continue Reading

The Evolution Theory of Malware and Our Thought

  Abstact: The status of malware, similar to that of the living creatures, is the result of the comprehensive elimination and selection. Actually, it is the same with all the software programs. Fundamentally speaking, the theory of evolution is a science on life-death and evolution. Bot……

Continue Reading

Development, Confusion and Exploration of Honeypot Technology

Abstact: A honeypot is a security resource that can be scanned, attacked and compromised. This presentation systematically summarized the development and status quo of Honeypots, as well the technical challenges researchers face. In the final part, the writer explores the Honeypots’ potentia……

Continue Reading

Data Storage and Security Strategies of Network Identity

Abstact: This presentation focuses on data storage and security strategies in terms of network identity security. In the beginning, some background about the topic is introduced. Then, the writer summarizes the methods used in cipher text attacks and the current solutions. In the final,……

Continue Reading

Security Challenges of Antivirus Engines, Products and Systems

Abstact: This presentation explores the challenges anti-virus engines, products and systems face. In many cases, the security products are no longer the credible dams when facing with the surging malware waves; they become the trembling islands that are vulnerable sometimes. Time Top……

Continue Reading