Quantcast
Browsing all 46 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Mister Perry goes to Red Square

This is me speaking at Infosec Moscow in 2008, and pointing to my name on a Cyrillic program board.

View Article


Image may be NSFW.
Clik here to view.

More than a river in Egypt…

It’s called Denial of Service. As these things go, that’s a very good name for it. In a world filled with Trojan Horses, Gilded Pineapples and various Microorganisms, Denial of Service is refreshingly...

View Article


Image may be NSFW.
Clik here to view.

Article 7

I was at VB in Canada in 2008 representing Trend Micro. Here I am seen speaking with Vincent Weafer

View Article

Image may be NSFW.
Clik here to view.

Article 6

View Article

Image may be NSFW.
Clik here to view.

How the other half lives…

The Apple Macintosh and System Security by David M Perry We first saw the Apple Macintosh at the 1984 Super bowl. At the time, IBM and Microsoft gave us only text based computing. The Mac appeared...

View Article


Image may be NSFW.
Clik here to view.

Silent Malware

There is a long standing expectation among the public, and even among IT people, that one should be able to see malware, or its effects. We expect malware to have symptoms, and perhaps this is the...

View Article

Image may be NSFW.
Clik here to view.

Film Review…WE STEAL SECRETS

I am not a hacker. I am not a computer programmer, and not even barely a technician. (although I was a technician in my day–that day was before the advent of Microsoft Windows 3.1, most of my work was...

View Article

Image may be NSFW.
Clik here to view.

How can there be 250,000 new viruses every day?

To answer this question, let’s take a look at Sofia, Bulgaria in 1991. Viruses of the day were pretty ordinary, although some of them were quite colorful. The slow spread of viruses permitted...

View Article


Image may be NSFW.
Clik here to view.

Making Sense

You probably think that you are running Antivirus Software. It’s a very common conception. This drives those of us on this side of the fence a little batty. You see, inside the AV industry we have been...

View Article


Image may be NSFW.
Clik here to view.

The Virus Geeks’ BBQ—not this year…

For seven years I ran an annual BBQ to which I invited everyone I knew in the entire world.  Because this contained a lot of computer antivirus people, I called this party the Annual Virus Geeks’...

View Article

Image may be NSFW.
Clik here to view.

Listing in Black and White

There is an overall philosophy of trust built into the operating system, built into the browser and built into the internet itself. It’s permissive, assuming that everything it finds everywhere is...

View Article

Image may be NSFW.
Clik here to view.

With Funding From Top Flight Investors, Fast-Growing NoRedInk Is On A Mission...

Reblogged from TechCrunch: The declining quality of humanities education (and student performance) in the U.S. has become a big problem. Last year, the College Board reported that SAT scores in...

View Article

Image may be NSFW.
Clik here to view.

You can’t beat free…

I hear from a lot of people that they are using free AV, and that Consumer Reports said “use two or three of them! after all they are free!!!” Now I don’t know if CR said that, but I know that the...

View Article


Image may be NSFW.
Clik here to view.

From the Pittsburgh Post Gazette

Law firms adding cybersecurity fields Law firms devote resources to beefing up cybersecurity practices November 1, 2013 9:05 PM Getty Images Venturing into the data breach Share with others:...

View Article

Image may be NSFW.
Clik here to view.

Submit virus samples and WIN!

Submit virus samples and WIN! The above link (the part in blue is a link) leads to an article about how to submit a malware sample to many AV companies at once. This assumes that you are capable of...

View Article


Image may be NSFW.
Clik here to view.

Target Breach!

This weekend I was interviewed by ABC news about the Target and Neiman Marcus breaches. You can see the video here. As usual, there is a lot more to the story than is covered on the evening news....

View Article

Image may be NSFW.
Clik here to view.

The Target Malware found (a followup repost from WIRED)

Image: Juanmonino/Getty The malicious program used to compromise Target and other companies was part of a widespread operation using a Trojan tool known as Trojan.POSRAM, according to a new report...

View Article


Image may be NSFW.
Clik here to view.

EVOLUTION AND FIXED IDEAS

There is a problem that we in the online security game almost never try to fix. I am going to call it the reality gap. THE SET UP You see, we attempt to educate you all on how to stay safe and secure...

View Article

Image may be NSFW.
Clik here to view.

SCADA System attack: should you be concerned?

Here’s a rare chance to get a peek into the future. There is yet another malware attack on Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems blogged about by...

View Article

Image may be NSFW.
Clik here to view.

I never METADATA I didn’t like.

It’s about time for another Black Hat/DEFCON season, and I am going over my notes from last year. One of the most remarkable things in last year’s BH was the keynote speech by General Alexander, head...

View Article
Browsing all 46 articles
Browse latest View live