Videos Tagged with "malware"


Fighting Threats in the Age of Cyberwar

August 14, 2012

ICSA Labs Chief Emerging Threat Researcher Roger Thompson discusses security challenges in the face of ever-evolving cyber threats in the wild. Thompson is a pioneer in combating malware. In 1987, he created Australia’s first anti-virus program after recognizing a trend in malware lifecycles...

Comments  (0)


What it Takes to Create Intelligence for a Stuxnet, Flame or Duqu

August 06, 2012

Stuxnet, Flame, Duqu and Mahdi are but payloads of overall programs designed through the work of intelligence. The news, anti-virus firms, managed security companies and consultancies all focus on the malware and the code. They are missing the big picture...

Comments  (0)


Flame Trojan: Fact or FUD?

June 05, 2012

What is FUD? Is it good or bad and how can you differentiate between what's true and what’s FUD? Like those old adverts that used to ask, “Is it real or is it Memorex”? Ask yourself whenever you hear something major has broken out that will infect every device on the planet, is it real, or is it FUD?

Comments  (0)


Javvad Malik Interviews Didier Stevens at Black Hat Europe

April 04, 2012

We had the pleasure of catching up with Didier Stevens at Black Hat Europe 2012, where he spoke to us about his latest tools and PDF vulnerabilities. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)


Malware Analysis: How to Decode JavaScript Obfuscation

January 05, 2012

When performing malware analysis one of the techniques the bad guys uses to hide their code is obfuscation. What this means is that the program is hidden or obscured to make malware analysis much more difficult. You didn’t think they would make it easy on you did they?

Comments  (0)


Hacker Halted: McAfee's George Kurtz Discusses the War on Security

October 31, 2011

"The current cybersecurity model is disconnected and unable to keep pace with the seismic explosion in malware. Providing protection to a heterogeneous world of connected devices requires a new approach to security. McAfee CTO George Kurtz will explain the required paradigm shift..."

Comments  (1)


Reverse Engineering the RSA Malware Attack

September 08, 2011

In March of this year, RSA - the security division of EMC - had announced they suffered a breach stemming from a "sophisticated attack" on their network systems. In this video, security expert J. Oquendo attempts to reverse engineer the attack using open source forensics tools...

Comments  (0)


Don't Black List White Listing

June 22, 2011

As AV vendors struggle to keep up they too are looking at white listing too. The trend is toward a hybrid model with white listing doing the heavy lifting to protect end points from zero-day and uniquely fabricated malware and black listing to provide reports...

Comments  (0)


Modern Malware Defense

May 25, 2011

Ashar Aziz, founder of FireEye, recognized early on that malware, zero day threats, and drive by downloads could slip by defenses that most organizations have deployed. He built the technology to take executables off the wire and run them in a mini-cloud of virtual emulators...

Comments  (0)


Beaconing Detection: A Required Defense

April 13, 2011

One of the hottest areas in network security is beaconing detection - from Ghost Net and and Night Dragon to attacks on the Pentagon, Google, and RSA. Once a desktop or server is infected it “phones home” for additional downloads, instructions, and ultimately to exfiltrate stolen data...

Comments  (0)