Published on March 4, 2014
Malware: Whom or What Are We Fighting? When characterizing ill-effects of malicious software, it’s too easy to focus on malware itself, forgetting that behind this tool are people that create, use and benefit from it. The best way to understand the threat of malware is to consider it within the larger ecosystem of computer fraud, espionage and other crime. A Tip of a Spear I define malware as code that is used to perform malicious actions. This implies that whether a program is malicious depends not so much on its capabilities but, instead, on how the attacker uses it. Sometimes malware is compared to a tip of a spear—an analogy that rings true in many ways, because it reminds us that there is a person on the other end of the spear. This implies that information security professionals aren’t fighting malware per se. Instead, our efforts contribute towards defending against individuals, companies and countries that use malware to achieve their objectives.
Understanding the Context Without the work of personnel that handles technical aspects of malware infections, the malware-empowered threat actors would be unencumbered. Yet, these tactical tasks need to be informed by a strategic perspective on the motivations and operations of the individuals that create, distribute and profit from malware. To deal with malware-enabled threats, organizations should know how to detect, contain and eradicate infections, but we cannot stop there. We also need to also understand the larger context of the incident. We won’t be able to accomplish this until we can see beyond the malicious tools to understand the perspective of our adversaries. The who is no less important than the what. — Lenny Zeltser 1. http://blog.zeltser.com/post/76215272596/malware-whom-or-what-are-we-fighting 2. http://blog.zeltser.com/post/1242534217/what-is-malware 3. http://zeltser.com/
Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...
In this presentation we will describe our experience developing with a highly dyna...
Presentation to the LITA Forum 7th November 2014 Albuquerque, NM
Un recorrido por los cambios que nos generará el wearabletech en el futuro
Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...
Malware: Whom or What Are We Fighting? ... This implies that information security professionals aren’t fighting malware per se. Instead, ...
... 1. http://blog.zeltser.com/post/76215272596/malware-whom-or-what-are-we-fighting 2. http://blog.zeltser.com/post/1242534217/what-is-malware 3. http ...
Fighting malware and spam ... Next, I see two people on the street, one of whom appears ... we tread very carefully and avoid
... we have created a sheet to show you whom we work with: ... Over 10 years of experience fighting malware on the front lines and behind the scenes.
1. Malware Fighting Luis Corrons PandaLabs Technical Director ; 2. Infection Sources Malware Fighting
Facebook reassures users after malware ... all of whom we notified and ... that the social network is "fighting the good fight" when it comes ...
Fighting malware and spam JULY 2012 VBSPAM COMPARATIVE REVIEW ... are never 100% perfect. We acknowledge that such false
... (fighting malware) ... “We do have a lot of malware in our collection, ... Vast malware repository dedicated to testing and research.
About StopBadware; What we do; ... A nonprofit that makes the Web safer by fighting ... here are some highlights from 5+ years of StopBadware ...