I can tell just by looking what kind of malware this is likely to be. I imagine that many people don’t look forward to getting malware on their machines, but I do. It’s great – as a person who fights this sort of thing on a regular basis, the “enemy” is kind enough to regularly […]Read More Malware via Email
Last year I made cybersecurity predictions, broadly rendered as: An increase in SSL visibility. Increased flight of data and sites from the US. Increased necessity for digital forensics in the mobile platform space. TOR would face more scrutiny and have to harden itself against those. Bitcoin would increase its dominance while Ethereum would become more […]Read More How Did I Do On 2015’s #Cybersecurity Predictions?
Indulging in the spotlight effect…Read More My REM Alumni Mailbox Shows Its 1337n3ss
It’s 2015, and once again I’m going to take a look at what I think will be the trends in cybersecurity for 2015. I’m going to focus on all of them all at once this time, instead of an individual post devoted to each, since it took me so long to do that in 2014. […]Read More #Cybersecurity #Trends for #2015
Picture from Northeastern.edu. I gave a talk at the Info Crime Summit in London yesterday, and identified what I think will be six trends in cybersecurity. I won’t provide the details here – I plan to outline those on my company’s blog – but I will provide a link to those posts on twitter. (You […]Read More Trends in #CyberSecurity for 2014 #bitcoin #litecoin #botcloud #deepweb #malware #bigdata
As part of Bright Talk’s Information Security channel, I recently gave a webinar on automated malware analysis. Entitled “Automated Malware Analysis – Let the Machines Do the Work!” the presentation can be found here at Bright Talk. Discussing how…Read More Bright Talk – Automated Malware Analysis – Let the Machines Do the Work! (Mitigating Enterprise IT Security Risks)