Security Primer: How malware is classified
The security industry was born at a time when the threat landscape consisted primarily of computer viruses that were spread by floppy disks. Antivirus was the name of the game, and the term “computer...
View ArticleNew video series: Security Chalk Talks from Sourcefire, Network World
We have all seen that advanced malware and attack chains continue to increase in sophistication. Ongoing DDoS attacks, advanced malware evolving to avoid sandbox detection or mobile malware...
View ArticleAdvanced Firewalls, part 2
The firewall has served as a primary barrier between a company’s IT assets and the outside world for many years. In our last video, we examined some of the major advancements that have been...
View ArticleHistory of Computer Viruses, Part 1: The Early Days
The concept of a computer virus was first documented in an academic paper in 1949. Described by renowned mathematician and physicist John von Neumann as “self-replicating programs,” the idea was...
View ArticleHistory of Computer Viruses, Part 2: Macro Viruses and Worms
The computer virus landscape has evolved enormously over the last few decades. Our previous talk discussed the conceptualization and eventual development of the world’s first computer viruses. Today,...
View ArticleAn Overview of Malware Protection Techniques
It should come as no surprise that nowadays malware has become big business. Bad actors are increasingly better funded and improving their approaches for attacking us. We have reached the point where...
View ArticleVideo tutorial: What is Conficker?
Today’s advanced malware threats are capable of changing behavior to block attempts to discover and remove them from systems. One of the most successful examples of malware deploying these techniques...
View ArticleVideo: What is a rootkit? (Chalk Talk)
The industrialization of hacking has introduced a wave of threats that are increasingly sophisticated, coming from more effective and efficient actors profiting from attacks on IT infrastructure. If...
View ArticleVideo: False Positives and False Negatives within IPS
Intrusion Prevention Systems are designed to detect and block malicious traffic in a network or on an endpoint. The most critical function that these systems provide is the ability to make a judgment...
View ArticleVideo: How malware harms systems
Building on our previous video about threat taxonomies, today we will discuss in greater depth how we describe and categorize threats by the kinds of harm that they can cause. Hacking has become big...
View Article
More Pages to Explore .....