Quantcast

Author: david b.

You will be billed $90,000 for this call 2: F-Secure detects trojan malware in mobile game

Read: You will be billed $90,000 for this call: Mikko Hypponen (F-Secure) on Dialers, telephone fraud, mobile malware Alright, so let’s think from the bad part point of view. This doesn’t work if they wanna have premium rate numbers, wanna extract money automatically with malware. They have to do it...

You will be billed $90,000 for this call: Mikko Hypponen (F-Secure) on Dialers, telephone fraud, mobile malware

F-Secure’s Chief Research Officer Mikko Hypponen speaks on telephone fraud schemes leading to money theft. Hi everybody, my name is Mikko Hypponen, and we’ll be spending the next 30 minutes in this turbo talk, talking about ‘You will be billed 90,000 dollars for this call’ So, let me just...

Changing threats to privacy 4: Moxie Marlinspike on PGP, OTR encryption and mobile privacy.

Again, if I’m looking into the future, the first thing I wanna do is deal with the choices that aren’t really choices. The second thing I wanna do is worry a little bit less about information freedom. And the third thing is I wanna worry a lot more about forward security and this key disclosure problem....

Changing threats to privacy: Moxie Marlinspike on privacy threats at Defcon. Part 3.

So one project that I started working on is called ‘GoogleSharing’. The basic premise of ‘GoogleSharing’ is that this choice that we are given is a false choice, and that we shouldn’t accept it, we should just reject it. So what we should say is, you know, it’s not really possible for us to stop...

Changing threats to privacy: Moxie Marlinspike on privacy threats at Defcon. Part 2.

One of my favourite most recent examples of small choices becoming big choices is this Firefox extension called ‘Adblock Plus’ – I’m sure that many people are familiar with this. The idea is that it’s supposed to help you block ads on the web. And the way it works is it allows you to specify a set...

Changing threats to privacy: Moxie Marlinspike on privacy threats at Defcon

The well-known whitehat hacker and internet security researcher Moxie Marlinspike (born Matthew Rosenfeld) speaks on privacy threats at Defcon. Мy name is Moxie Marlinspike, I’m from the Institute for Disruptive Studies. And I would like to take some time to talk about privacy. What I’d like to do is...

Hacking Online Games: Josh Phillips and Michael Donnelly at Defcon 19. Part 3.

Read: Hacking Online Games: Josh Phillips and Michael Donnelly at Defcon 19. Part 1. Read: Hacking Online Games: Josh Phillips and Michael Donnelly at Defcon 19. Part 2. Final part of MMO hacking discussion at Defcon 19 by Michael Donnelly, Glider WoW bot author, and Josh Phillips, Kaspersky Lab. Mike...

Hacking Online Games: Josh Phillips and Michael Donnelly at Defcon 19. Part 2.

Read: Hacking Online Games: Josh Phillips and Michael Donnelly at Defcon 19. Part 1. Continued discussion of online game hacking by Michael Donnelly (WoW bot Glider) and Josh Phillips (Kaspersky Lab Senior Malware Analyst). Josh Phillips: Anybody know Rich Thurman? He was, I think, one of the first guys who...

Hacking Online Games: Josh Phillips and Michael Donnelly at Defcon 19

Josh Phillips (Senior Malware Analyst at Kaspersky Lab): So my name is Josh Phillips. I have a surprise guest who did not show up on the schedule, his name is Michael Donnelly. I’ll have him, you know, introduce himself in a little bit. I don’t know what it is but generally I always get the last law at...

Free Antivirus vs Paid Antivirus: Interview with Michael Gregg

Offers for free antivirus software – there are everywhere. But is software that you really don’t have to pay for really going to protect you from the viruses? Michael Gregg – a cyber security consultant and President of ‘Superior Solutions’. – Michael, we appreciate your being with us....

Top cyber security threats: Interview with Michael Gregg, Superior Solutions

Michael Gregg – the COO of the company called ‘Superior Solutions’. – Michael, thanks for coming in first off. More and more people are doing banking online these days. First, let’s start with banking trojans – one of those. – Banking trojans are pieces of malware that are dropped...

Mobile security: interview with Nikolay Grebennikov, Kaspersky Lab

– Smartphones are everywhere: from CEOs to CIOs, to HR Executives, to average end users – everyone is using a smartphone with lots and lots of really important data flowing around these little devices. We’ve invited the CTO of Kaspersky Lab Mr. Nikolay Grebennikov to talk about security issues on...

The future of antimalware software: Interview with Nikolay Grebennikov, Kaspersky Lab

Nikolay Grebennikov – Chief Technology Officer at Kaspersky Lab. – Nikolay, we wanted to talk to you about the changing face of the antimalware products – you know, there’s this false perception that antivirus and antimalware technology is based on signatures, but that’s obviously a false...

Brian Krebs talks in Panda Security Blogger Summit. Part 2.

Brian Krebs – renowned security journalist and the author of KrebsOnSecurity.com blog. I wouldn’t wanna stress this comparison too much but even the way these cyber gangs splice up, what they steal is very evocative of the drug gangs, considering that a major component of these ‘Cloud cartels’...

Brian Krebs talks in Panda Security Blogger Summit. Part 1.

Brian Krebs – renowned security journalist and the author of KrebsOnSecurity.com blog. I wanna try to set the tone of this discussion in a slightly provocative way. I’ve participated in enough of these round tables on security to know that they often devolve into discussions about how consumers...

Brian Krebs on cybersecurity and the future of hacking

Brian Krebs, the author of ‘Krebs On Security’ – a daily blog on computer security and cybercrime, talks about the cybersecurity problems, the future of hacking and Cloud Security Technologies. – Which are the main cybersecurity troubles for common Internet users? – I think that...

Cloud Computing security: interview with Kurt Wismer

Kurt Wismer, security expert author of Antivirus Rants, gives his opinion about the security technologies based on Cloud Computing. – Which are the main cybersecurity troubles for common Internet users? – I think the main problems are pretty much the normal ones that you would think of: botnets,...

Create, save and store secure passwords: Interview with David Emm, Kaspersky Lab.

David Emm is a Senior Security Researcher at Kaspersky Lab. Today we’re gonna be talking about password security, and David’s here with some great advice on how to keep secure your passwords to the websites and applications that you use and avoid getting hacked or losing control of your account....

iOS and Android security comparison: Interview with Dr. Charlie Miller

Dr. Charlie Miller is a former hacker who has become an information security consultant and analyst with Accuvant LABS which is a research driven IT company dealing with computer security challenges. In this interview, he is going to speak on the issue of iOS and Android operating systems comparison in terms...

Prevent and report phishing scam emails

A lot of people have been talking about phishing recently, what is it and how can we prevent it? You may have heard of phishing, it’s a leading cause of the online identity theft. But what is phishing? It’s a type of scam that involves individuals using Emails designed to look like they came from a...

Shop safely online

It’s important to know how to shop safely online. Online shopping is a great resource, allowing you to order products from the comfort of your home or office and have them shipped directly to you. Online retailers frequently need your personal information, such as home address, phone number and...

Manage your online reputation

As the web technologies advance, it’s getting increasingly important to know how to find and control what’s posted about you online. One easy way to find out what information is posted about you online is to search for your name in a search engine. When you see results come up for your name, you...

Secure online sharing

Sharing online information with others has definitely become an inalienable part of the Internet users’ routine. Because the Internet connects people so quickly and storage is often free, it’s ideal for sharing Email, photos and blog posts with family and friends. Online sharing allows you to take a...

Keep password safe

Many people have questions about how to practice password safety. So, how do you keep passwords safe online? Lots of online services ask you to register yourself by creating a username and password. Keeping these passwords safe is important to your online safety. The first step to keep these passwords safe...

Be safe online

The Internet provides countless opportunities to do things like find information through web-surfing and online searches, share information with others and even shop. With more and more information coming online everyday, understanding how to be safe online is becoming increasingly important. Now, while you...