Articles on Malware
- Malware Getting to Know Larry Seltzer (Not Lenny Zeltser)
- Cheat Sheets Analyzing Malicious Documents Cheat Sheet Analyzing malicious documents involves examining files for anomalies, locating embedded code like macros or JavaScript, extracting and deobfuscating suspicious content, and emulating shellcode. Key...
- Leadership Presentations, Webcasts and Speaking Engagements
- Malware 4 Steps To Combat Malware Enterprise-Wide Enterprise malware defense follows four phases: Plan by understanding infection vectors and prioritizing targets; Resist using enterprise management systems to deploy controls at scale; Detect...
- Social Networking When Bots Chat With Social Network Participants Scammers use compromised social network accounts for malicious chats—currently with human operators, but increasingly automated bots. Creating intelligent chat bots for Facebook is straightforward...
- Social Networking When Bots Control Content on Social Networking Sites Bots on social networks build fake friendships to improve reputation, mimic human profiles to evade detection, and flood discussions with spam to drown out legitimate content. Social networking sites...