Viruses & Malware

Bd07d58f0d31d48d3764821d109bf165

Fighting Threats in the Age of Cyberwar

August 14, 2012

ICSA Labs Chief Emerging Threat Researcher Roger Thompson discusses security challenges in the face of ever-evolving cyber threats in the wild. Thompson is a pioneer in combating malware. In 1987, he created Australia’s first anti-virus program after recognizing a trend in malware lifecycles...

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

What it Takes to Create Intelligence for a Stuxnet, Flame or Duqu

August 06, 2012

Stuxnet, Flame, Duqu and Mahdi are but payloads of overall programs designed through the work of intelligence. The news, anti-virus firms, managed security companies and consultancies all focus on the malware and the code. They are missing the big picture...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Flame Trojan: Fact or FUD?

June 05, 2012

What is FUD? Is it good or bad and how can you differentiate between what's true and what’s FUD? Like those old adverts that used to ask, “Is it real or is it Memorex”? Ask yourself whenever you hear something major has broken out that will infect every device on the planet, is it real, or is it FUD?

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Ken Baylor at Black Hat EU 2012

April 23, 2012

Infosec Island's Javvad Malik was fortunate to catch up with Dr. Ken Baylor, widely recognized as a leader in Bank Security, IT Security and Regulatory Compliance, who conducted a session designed to teach attendees how to defend against botnets by understanding how to build them...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Didier Stevens at Black Hat Europe

April 04, 2012

We had the pleasure of catching up with Didier Stevens at Black Hat Europe 2012, where he spoke to us about his latest tools and PDF vulnerabilities. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Malware Analysis: How to Decode JavaScript Obfuscation

January 05, 2012

When performing malware analysis one of the techniques the bad guys uses to hide their code is obfuscation. What this means is that the program is hidden or obscured to make malware analysis much more difficult. You didn’t think they would make it easy on you did they?

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Reverse Engineering the RSA Malware Attack

September 08, 2011

In March of this year, RSA - the security division of EMC - had announced they suffered a breach stemming from a "sophisticated attack" on their network systems. In this video, security expert J. Oquendo attempts to reverse engineer the attack using open source forensics tools...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Modern Malware Defense

May 25, 2011

Ashar Aziz, founder of FireEye, recognized early on that malware, zero day threats, and drive by downloads could slip by defenses that most organizations have deployed. He built the technology to take executables off the wire and run them in a mini-cloud of virtual emulators...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Metasploit JAVA Meterpreter

August 17, 2010

If you haven't noticed the Metasploit Framework has a JAVA meterpreter payload for some time now It supports all the commands supported by the PHP meterpreter, as of SVN revision 9777, and additionally the ipconfig, route, and screenshot commands. It is not fully implemented into the framework yet and in order to get it up and running some manual tweaking is needed.

Comments  (0)


Most Liked