Videos Tagged with "malware"

Bd07d58f0d31d48d3764821d109bf165

Fighting Threats in the Age of Cyberwar

August 14, 2012

ICSA Labs Chief Emerging Threat Researcher Roger Thompson discusses security challenges in the face of ever-evolving cyber threats in the wild. Thompson is a pioneer in combating malware. In 1987, he created Australia’s first anti-virus program after recognizing a trend in malware lifecycles...

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

What it Takes to Create Intelligence for a Stuxnet, Flame or Duqu

August 06, 2012

Stuxnet, Flame, Duqu and Mahdi are but payloads of overall programs designed through the work of intelligence. The news, anti-virus firms, managed security companies and consultancies all focus on the malware and the code. They are missing the big picture...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Flame Trojan: Fact or FUD?

June 05, 2012

What is FUD? Is it good or bad and how can you differentiate between what's true and what’s FUD? Like those old adverts that used to ask, “Is it real or is it Memorex”? Ask yourself whenever you hear something major has broken out that will infect every device on the planet, is it real, or is it FUD?

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Didier Stevens at Black Hat Europe

April 04, 2012

We had the pleasure of catching up with Didier Stevens at Black Hat Europe 2012, where he spoke to us about his latest tools and PDF vulnerabilities. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Malware Analysis: How to Decode JavaScript Obfuscation

January 05, 2012

When performing malware analysis one of the techniques the bad guys uses to hide their code is obfuscation. What this means is that the program is hidden or obscured to make malware analysis much more difficult. You didn’t think they would make it easy on you did they?

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted: McAfee's George Kurtz Discusses the War on Security

October 31, 2011

"The current cybersecurity model is disconnected and unable to keep pace with the seismic explosion in malware. Providing protection to a heterogeneous world of connected devices requires a new approach to security. McAfee CTO George Kurtz will explain the required paradigm shift..."

Comments  (1)

850c7a8a30fa40cf01a9db756b49155a

Reverse Engineering the RSA Malware Attack

September 08, 2011

In March of this year, RSA - the security division of EMC - had announced they suffered a breach stemming from a "sophisticated attack" on their network systems. In this video, security expert J. Oquendo attempts to reverse engineer the attack using open source forensics tools...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Don't Black List White Listing

June 22, 2011

As AV vendors struggle to keep up they too are looking at white listing too. The trend is toward a hybrid model with white listing doing the heavy lifting to protect end points from zero-day and uniquely fabricated malware and black listing to provide reports...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Modern Malware Defense

May 25, 2011

Ashar Aziz, founder of FireEye, recognized early on that malware, zero day threats, and drive by downloads could slip by defenses that most organizations have deployed. He built the technology to take executables off the wire and run them in a mini-cloud of virtual emulators...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Beaconing Detection: A Required Defense

April 13, 2011

One of the hottest areas in network security is beaconing detection - from Ghost Net and and Night Dragon to attacks on the Pentagon, Google, and RSA. Once a desktop or server is infected it “phones home” for additional downloads, instructions, and ultimately to exfiltrate stolen data...

Comments  (0)


Most Liked