Quantcast
Channel: Rational Survivability » Malware
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

100% Undetectable Malware (?)

I know I’m checking in late on this story, but for some reason, it just escaped my radar a month or so ago when it appeared…I think that within the context of some of the virtualization discussions in...

View Article



Image may be NSFW.
Clik here to view.

ICMP = Internet Compromise Malware Protocol…the end is near!

Bear with me here as I admire the sheer elegance and simplicity of what this latest piece of malware uses as its covert back channel: ICMP.  I know…nothing fancy, but that’s why I think its simplicity...

View Article

Image may be NSFW.
Clik here to view.

Virtualization is Risky Business?

Over the last couple of months, the topic of virtualization and security (or lack thereof) continues to surface as one of the more intriguing topics of relevance in both the enterprise and service...

View Article

Image may be NSFW.
Clik here to view.

Blue Lane VirtualShield for VMWare – Here we go…

Greg Ness from Blue Lane and I have known each other for a while now, and ever since I purchased Blue Lane’s first release of products a few years ago (when I was on the "other" side as a *gasp*...

View Article

Image may be NSFW.
Clik here to view.

My IPS (and FW, WAF, XML, DBF, URL, AV, AS) *IS* Bigger Than Yours Is…

Interop has has been great thus far.  One of the most visible themes of this year’s show is (not suprisingly) the hyped emergence of 10Gb/s Ethernet.  10G isn’t new, but the market is now ripe with...

View Article


Image may be NSFW.
Clik here to view.

Fat Albert Marketing and the Monetizing of Vulnerability Research

Over the last couple of years, we’ve seen the full spectrum of disclosure and "research" portals arrive on scene; examples stem from the Malware Distribution Project to 3Com/TippingPoint’s Zero Day...

View Article

Image may be NSFW.
Clik here to view.

The Russian Business Network, ShadowCrew, HangUp Team, 76service, “Malware as...

Scott Berinato posted the first of three installments of an expose highlighting the economics of the malware industry in CSO magazine.  It’s a fascinating read with a blow-by-blow of how Don Jackson...

View Article

Image may be NSFW.
Clik here to view.

Google Security: Frightening Statistics On Drive-By Malware Downloads…

Read a scary report from Google’s security team today titled "All your iFrame Are Point to Us" regarding the evolving trends in search-delivered drive-by malware downloads.  Check out the full post...

View Article


Image may be NSFW.
Clik here to view.

A Worm By Any Other Name Is…An Information Epidemic?

Martin McKeay took exception to some interesting Microsoft research that suggested that the similar methodologies and tactics used by malicious software such as worms/viri, could also be used as an...

View Article


Image may be NSFW.
Clik here to view.

Why Steeling Your Security Is Less Stainless and More Irony…

(I originally pre-pended to this post a lengthy update based on my findings and incident response, but per a suggestion from @jeremiahg, I’ve created a separate post here for clarity) Earlier today I...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images