Mister Perry goes to Red Square
This is me speaking at Infosec Moscow in 2008, and pointing to my name on a Cyrillic program board.
View ArticleMore than a river in Egypt…
It’s called Denial of Service. As these things go, that’s a very good name for it. In a world filled with Trojan Horses, Gilded Pineapples and various Microorganisms, Denial of Service is refreshingly...
View ArticleArticle 7
I was at VB in Canada in 2008 representing Trend Micro. Here I am seen speaking with Vincent Weafer
View ArticleHow the other half lives…
The Apple Macintosh and System Security by David M Perry We first saw the Apple Macintosh at the 1984 Super bowl. At the time, IBM and Microsoft gave us only text based computing. The Mac appeared...
View ArticleSilent Malware
There is a long standing expectation among the public, and even among IT people, that one should be able to see malware, or its effects. We expect malware to have symptoms, and perhaps this is the...
View ArticleFilm Review…WE STEAL SECRETS
I am not a hacker. I am not a computer programmer, and not even barely a technician. (although I was a technician in my day–that day was before the advent of Microsoft Windows 3.1, most of my work was...
View ArticleHow can there be 250,000 new viruses every day?
To answer this question, let’s take a look at Sofia, Bulgaria in 1991. Viruses of the day were pretty ordinary, although some of them were quite colorful. The slow spread of viruses permitted...
View ArticleMaking Sense
You probably think that you are running Antivirus Software. It’s a very common conception. This drives those of us on this side of the fence a little batty. You see, inside the AV industry we have been...
View ArticleThe Virus Geeks’ BBQ—not this year…
For seven years I ran an annual BBQ to which I invited everyone I knew in the entire world. Because this contained a lot of computer antivirus people, I called this party the Annual Virus Geeks’...
View ArticleListing in Black and White
There is an overall philosophy of trust built into the operating system, built into the browser and built into the internet itself. It’s permissive, assuming that everything it finds everywhere is...
View ArticleWith Funding From Top Flight Investors, Fast-Growing NoRedInk Is On A Mission...
Reblogged from TechCrunch: The declining quality of humanities education (and student performance) in the U.S. has become a big problem. Last year, the College Board reported that SAT scores in...
View ArticleYou can’t beat free…
I hear from a lot of people that they are using free AV, and that Consumer Reports said “use two or three of them! after all they are free!!!” Now I don’t know if CR said that, but I know that the...
View ArticleFrom the Pittsburgh Post Gazette
Law firms adding cybersecurity fields Law firms devote resources to beefing up cybersecurity practices November 1, 2013 9:05 PM Getty Images Venturing into the data breach Share with others:...
View ArticleSubmit virus samples and WIN!
Submit virus samples and WIN! The above link (the part in blue is a link) leads to an article about how to submit a malware sample to many AV companies at once. This assumes that you are capable of...
View ArticleTarget Breach!
This weekend I was interviewed by ABC news about the Target and Neiman Marcus breaches. You can see the video here. As usual, there is a lot more to the story than is covered on the evening news....
View ArticleThe Target Malware found (a followup repost from WIRED)
Image: Juanmonino/Getty The malicious program used to compromise Target and other companies was part of a widespread operation using a Trojan tool known as Trojan.POSRAM, according to a new report...
View ArticleEVOLUTION AND FIXED IDEAS
There is a problem that we in the online security game almost never try to fix. I am going to call it the reality gap. THE SET UP You see, we attempt to educate you all on how to stay safe and secure...
View ArticleSCADA System attack: should you be concerned?
Here’s a rare chance to get a peek into the future. There is yet another malware attack on Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems blogged about by...
View ArticleI never METADATA I didn’t like.
It’s about time for another Black Hat/DEFCON season, and I am going over my notes from last year. One of the most remarkable things in last year’s BH was the keynote speech by General Alexander, head...
View Article