Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Advanced Phishing Tactics Beyond User Awareness 2: Anatomy of a Spear Phishing Attack

Sharing their pentesting experience, Martin Bos and Eric Milam outline the stages of a spear phishing attack and analyze email harvesting as a starting point. Martin Bos: Here are our obligatory statistics (see image); every presentation has to have some statistics. Like I said, these are more for the...

Advanced Phishing Tactics Beyond User Awareness

Accuvant LABS’ Senior Security Consultant Martin Bos and the Company’s Principal Security Assessor Eric Milam spotlight the issues related to spear phishing from the pentester’s perspective during their session at Hack3rCon event. Martin Bos: Hi everybody! We’re here from Accuvant LABS; we’re...

An Attacker’s Day into Human Virology 6: Crossing the Frontier

The primary issue looked into within this part of the presentation is blurring and crossing the border between the realms of biological and computer viruses. Same Essence, Different Materialization Now, you guys who are security researches probably know that software is vulnerable. And all these data,...

An Attacker’s Day into Human Virology 5: Thoughts on Designed Biological Viruses and Darwinian Computer Viruses

The matters Guillaume Lovet touches upon in this section have to do with the frontier between bio and PC viruses, and whether it can be crossed spontaneously. Guillaume Lovet: The defense mechanisms: we’ve been over some of those already. Detecting viruses inside of the body makes use of heuristics; we...

An Attacker’s Day into Human Virology 4: Which World Wins the Race?

Ruchna Nigam proceeds with the analysis of self-preservation techniques, attack hallmarks, and individual advantages of the viruses from both worlds concerned. Attacking the Defenses Something really smart that you can see in human viruses is that instead of trying to penetrate the defenses of the body,...

An Attacker’s Day into Human Virology 3: Common Properties of Human and Computer Viruses

Ruchna Nigam, representative of the FortiGuard Labs, now takes the floor to talk about some essential things human and computer viruses have in common. Ruchna Nigam: Okay, now that you have had your Biology lesson, let’s look at some of the attack strategies that are common between the biological world and...

An Attacker’s Day into Human Virology 2: Structure and Hallmarks of the Immune System

Having introduced the subject, Guillaume Lovet breaks down the human immune system into constituents and does some comparing with computer defense mechanisms. What do we have in our bodies to fight against viruses? (see right-hand image) Basically, the immune system is divided in two different subsystems....

An Attacker’s Day into Human Virology: Human vs Computer

This entry reflects the Black Hat Europe presentation based on the research by Fortinet’s Guillaume Lovet and Axelle Apvrille, dedicated to comparing the human virus defense mechanisms with those implemented in computers. Guillaume Lovet: This presentation is a bit different from the other talks that you...

Moti Yung and Adam Young on Kleptography and Cryptovirology 6: The Summary

Having explained the concepts and applications of cryptovirology and kleptography, Moti Yung now provides a set of conclusions on the subject. I will now move to the conclusion. I showed you several malware attacks, either general malware or Trojans, I mentioned just Trojans inside cryptosystems. In each...

Moti Yung and Adam Young on Kleptography and Cryptovirology 5: Skeptical Experts and Smart Attackers

Moti Yung now outlines how the expert community and antivirus industry reacted to his and Adam Young’s book, and dwells on the applied aspects of kleptography. Reactions to “Malicious Cryptography – Exposing Cryptovirology” Book We got some reaction to what we described in our book....