Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

The Art of Effectively Communicating with a Cyber Predator 3: Example of a Matching Conversation

To make the presentation more vivid, Janice Niederhofer now provides a demo of the conversation with a cyber predator, demonstrating the art of matching. Let’s move on. Conversely, if you want to decrease rapport, you can deliberately mismatch. We’ve been matching the cyber predator’s communication and...

The Art of Effectively Communicating with a Cyber Predator 2: Building Rapport with the Scammer

Janice Niederhofer now elaborates on establishing rapport with a cyber predator, focusing on language matching techniques and the use of so-called VAK senses. Build Rapport, then Move Forward For rapport to exist between you and a cyber predator, you have to have 3 things: understanding, appreciation, and...

Luring Your Prey – The Art of Effectively Communicating with a Cyber Predator

Janice Niederhofer, founder and CEO of Peerage Consulting, Inc., gives a captivating presentation at RSA Conference, dissecting the subtle yet very significant components of online communication with scammers and other ill-minded individuals seeking preys on the Internet. Welcome to the session:...

VX – The Virus Underground 6: Hoaxes, Social Engineering and Cryptography

At the end of the Q&A part, SkyOut touches upon VXer’s attitude to hoaxes, cryptography, and the blurred line between the legal and illegal in their activity. QUESTIONS? – You mentioned hoaxes. You say you do viruses and you don’t want to harm anybody, but to prove that hoaxes work you need to...

VX – The Virus Underground 5: Discussing Interaction with Antivirus Companies

SkyOut now invites 24C3 conference attendees to participate in a more down-to-earth discussion which starts with insight into relation between AVs and VXers. QUESTIONS? Ok, we have a lot of time, so we can have a little discussion if you want. – So, first question would be: in the beginning and the end...

VX – The Virus Underground 4: Problems of the VX Scene

SkyOut brings attention to the main problems of the virus underground, and summarizes the presentation’s key points with regard to the state of VX scene. Connection between VX and AV So what connection do we have between VX and AV: VX – virus exchangers, and AV – antivirus companies? –...

VX – The Virus Underground 3: VXers’ Communication Channels

The subjects touched upon by Marcell Dietl in this part are types of payloads and malware out there, as well as the way VXers communicate with each other. Types of Payloads So, what types of payloads do we have? First of all, what’s a payload? A payload is everything else but reproduction. Reproduction is...

VX – The Virus Underground 2: Cross-Platform Malware and Virus Spreading Techniques

As part of his insider’s perspective, VXer SkyOut now focuses on the underground’s prevalent programming languages applicable for coding cross-platform malware, and highlights the common techniques used for virus distribution. Cross-Platform Malware So, let’s talk a bit about cross-platform malware,...

VX – The Virus Underground

The German VXer and social engineer Marcell Dietl, aka SkyOut, gives a presentation at 24C3 conference organized by Chaos Computer Club (CCC) to describe the different groups of virus coders and shed light on how they are affecting the VX scene. Ok, what shall this speech be about? Well, it shall be an...

Owning Bad Guys and Mafia with JavaScript Botnets 5: Tips to Maintain Online Privacy

The final part of Chema Alonso’s Defcon talk comprises a demo on infecting users through the rogue proxy server, and some general security tips to follow. I wanted to do a real demo, but first I’d like to show you the control panel and what it looks like. Of course, we turned off the proxy server on...