Video: How malware harms systems

Video: How malware harms systems

In Part 2 of this Threat Taxonomy series, we take a look at how different security threats harm their targets. The video looks at backdoor/remote access Trojans, Infostealers, spambots, downloaders and adware/spyware.

Security Primer: How malware is classified
video

Security Primer: How malware is classified

Overview of the major criteria used to classify malware: Propagation, Harm Done and Resiliency.

Video: False Positives and False Negatives within IPS

Intrusion Prevention Systems are designed to detect and block malicious traffic in a network or on an endpoint. The most critical function that these systems provide is the ability to make a judgment about the nature of a network...

Video: What is a rootkit? (Chalk Talk)

The industrialization of hacking has introduced a wave of threats that are increasingly sophisticated, coming from more effective and efficient actors profiting from attacks on IT infrastructure. If you think about it, just 10...

Video tutorial: What is Conficker?

Today’s advanced malware threats are capable of changing behavior to block attempts to discover and remove them from systems. One of the most successful examples of malware deploying these techniques in recent years was...

An Overview of Malware Protection Techniques

It should come as no surprise that nowadays malware has become big business. Bad actors are increasingly better funded and improving their approaches for attacking us. We have reached the point where hacking has become...

History of Computer Viruses, Part 2: Macro Viruses and Worms

The computer virus landscape has evolved enormously over the last few decades. Our previous talk discussed the conceptualization and eventual development of the world’s first computer viruses. Today, we’ll explore the evolution...

History of Computer Viruses, Part 1: The Early Days

The concept of a computer virus was first documented in an academic paper in 1949. Described by renowned mathematician and physicist John von Neumann as “self-replicating programs,” the idea was formed from intellectual curiosity...

Advanced Firewalls, part 2

The firewall has served as a primary barrier between a company’s IT assets and the outside world for many years. In our last video, we examined some of the major advancements that have been incorporated into advanced firewalls...

New video series: Security Chalk Talks from Sourcefire, Network World

We have all seen that advanced malware and attack chains continue to increase in sophistication. Ongoing DDoS attacks, advanced malware evolving to avoid sandbox detection or mobile malware establishing a foothold are just a few...

Load More