Risk
3/11/2008
05:57 PM
Thomas Claburn
Thomas Claburn
Commentary
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Malware Made Real

Romanian visual artist Alex Dragulescu has created a series of images depicting malware, under a commission from MessageLabs, a communications security company. The results are stunning because they sustain the expectation that malicious code is somehow alive.

Romanian visual artist Alex Dragulescu has created a series of images depicting malware, under a commission from MessageLabs, a communications security company. The results are stunning because they sustain the expectation that malicious code is somehow alive.

Dragulescu uses algorithms and data culled from blogs, spam, and other computer files as his raw materials. For the MessageLabs commission, he developed images using actual malware code."For each piece of disassembled code, API calls, memory addresses, and subroutines are tracked and analyzed," Dragulescu explains on his site. "Their frequency, density, and grouping are mapped to the inputs of an algorithm that grows a virtual 3-D entity. Therefore, the patterns and rhythms found in the data drive the configuration of the artificial organism."

We talk about computer viruses as if they are biological viruses. They're not, of course, but if they were organic entities, this is how they might be expected to look under a microscope.

Comment  | 
Email This  | 
Print  | 
RSS
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
All Videos
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2130
Published: 2015-03-05
Cisco Secure Access Control Server (ACS) provides an unintentional administration web interface based on Apache Tomcat, which allows remote authenticated users to modify application files and configuration files, and consequently execute arbitrary code, by leveraging administrative privileges, aka B...

CVE-2014-9688
Published: 2015-03-05
Unspecified vulnerability in the Ninja Forms plugin before 2.8.10 for WordPress has unknown impact and remote attack vectors related to admin users.

CVE-2015-0598
Published: 2015-03-05
The RADIUS implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (device reload) via crafted IPv6 Attributes in Access-Accept packets, aka Bug IDs CSCur84322 and CSCur27693.

CVE-2015-0607
Published: 2015-03-05
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connecti...

CVE-2015-0657
Published: 2015-03-05
Cisco IOS XR allows remote attackers to cause a denial of service (RSVP process reload) via a malformed RSVP packet, aka Bug ID CSCur69192.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.
UPCOMING!
Wednesday, March 18, 1pm EDT

New Cybercrime Crackdown Could Backfire And Criminalize Security Professionals
FULL SCHEDULE | ARCHIVED SHOWS