Hi {{ session.user.profile.firstName }}
Pierre-Marc Bureau, Malware Researcher at ESET
Most Internet users have been in contact with malicious software (malware) and most of us understand these threats should be avoided. Far less people understand what happens when a computer is attacked, more precisely, what are the objectives of the attackers and how these attacks could affect your business?
We will present various attacks that have been recently witnessed which illustrate the different motivations of malware creators and operators. We will also show how banking trojans such as Win32/Gataka can attack on alternative operating systems such as OSX/Flashback. Finally, we will cover cases of cyber espionage with the case of ACAD/Medre.
Join Pierre-Marc Bureau, Mallware Researcher at ESET as he shows what happens in an attack and how to protect your business.
Jul 23 2012
60 mins
What Happens in an Attack?
More from this community:

Mobile Computing

  • Date
  • Rating
  • Views
  • No longer are voice biometrics tentatively tested in single channels and measured against purely theoretical equal error rates. In reality, businesses are implementing high performance solutions that easily scale, yet deliver a consistently low friction user experience and strong security across a business.

    In this webinar, Dan Miller, lead analyst and founder of Opus Research, joins ValidSoft’s VP for North America, Shawn Edmunds, and Image Ware System’s CTO and VP David Harding to discuss how successful integration of highly optimized voice biometrics has never been easier or more cost effective for your business.
  • Traditionally, most organizations have used email for sending files to colleagues or clients. However, as files increase in size and email attachment limits are an issue, employees are forced to either use old-fashioned FTP or circumvent company regulations by turning to insecure consumer-grade applications. 72% of the people we surveyed do! Let us tell you about a better way.

    Join us to learn 4 key best practices:
    1) Don’t mess with what users know – continue to use Microsoft Outlook to drive file transfers (just don’t leave it to Outlook to deliver them)
    2) Don’t leave it to users to decide when something is too big or too sensitive to send by email
    3) Do make the experience better and faster for users (as opposed to more complicated and slower)
    4) Have a policy (and protection) that covers email-based sharing even when mobile

    With Workshare, employees can email links to files, eliminating the need for attachments, while continuing to us the familiar Outlook to do it. Policy-enforcement means companies can secure, track, and expire file access and activity beyond the corporate firewall.

    Workshare also uses its customizable policy engine to ensure that the content that is shared is secured and removed of any sensitive information before it is shared.
    Intelligently scan and secure documents too large or too important to send by email. IT can set policies to determine when a file is too large to send, or critically when to block or clean a file if it contains sensitive hidden data that would expose the company to risk.
  • The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
  • The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
  • Join us on Friday, August 28 for a live online demo. Learn how RingCentral supports your mobile workforce with powerful communications that work on the desktop, desk phone, smartphone, and tablet, making everyone productive and professional no matter where they are.

    Understand how cloud-based solutions overcome many of the limitations of legacy PBX systems and make a BYOD environment easier and less costly to manage. See a demo of our powerful mobile app that lets you take HD voice, fax, text, online meetings, conferencing and more with you anywhere on your smart devices.

    You’ll see how it works and get answers to your questions. Learn how to:
    •Call, text, or fax anyone, anytime from your mobile app with Company Directory
    •Use a single business identity with one business number.
    •Manage your entire system of locations, departments, extensions, and direct numbers
    •Use advanced call control for call flip, transfer, park, recording, and more.
  • Sponsored by Janrain

    Modern marketing has become customer-centric. Rather than one-way, generic message broadcasting, marketing today is about delivering a relevant, personalized experience… but how do you deliver relevance if you don’t know who you’re talking to?

    Knowing who each customer is and what she cares about is a major challenge with two parts:

    * Data collection - picking up the digital breadcrumbs from each customer interaction
    * Data unification - tying together customer details from multiple interactions and databases

    This webinar will explain:
    * Why customer identity is more critical than ever
    * The challenges of collecting and unifying customer data
    * Key tools for capturing customer data
    * Best options for enriching existing customer profiles
    * Methods and technologies to unify customer data

    And includes data from:
    * A survey of 506 marketers about customer identity and personalization
    * 27 vendor and brand interviews


    Speakers:
    Andrew Jones, Analyst, VentureBeat
    Scott Kabat, CMO, Prezi
    Shawn Burns, SVP web and digital marketing, Schneider Electric
    Zouhair Belkoura, CEO, KeepSafe

    This webinar will be based on Andrew Jones' ID Unification report, published in July, 2015.

    Check out VB Insight to access Andrew's ID Unification report, and to access the latest research on Marketing Technology: http://insight.venturebeat.com
  • Looking out, your organization’s success depends on flexibility and ability to rapidly adapt to market trends, and innovate faster. Looking in, it also depends on increased business efficiency and effectiveness. These two can, and need to be achieved together.

    You can drive innovation and time to market by adopting Agile software development. But business efficiency and effectiveness are hard to achieve when you manage a disparate array of applications, deployed across a range of platforms and tools chosen by different teams in your organization: business, development, quality, operations. Maintaining that type of environment is costly, inefficient, and inherently risky.

    Take quality as an example. Iterative and agile development drives faster cycle times. But quality for agile has lagged the updates of agile. The result is riskier code practices, with less visibility, at a time when organizations face exposure to risk due to customer-facing mobile and other new applications.

    You need consistent agile quality strategies and application component visibility in order to succeed.

    In this webinar, we will show you how HP Agile Manager enables your team to surface quality throughout the entire software quality lifecycle, from writing quality code, to functional and nonfunctional testing of Agile artifacts, all the way to monitoring the application in production, and looping back production feedback into development, thus opening the door to DevOps.
  • Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
  • The rise of mobile offers a once-in-a-generation chance for deeper connections with consumers because mobile is inherently intimate and always-on. Being able to reach customers at any time, on any device, allows brands to boost engagement, increase retention, and grow revenue. But with so many avenues of communication, including email, push notifications, and social, businesses run the risk of spamming users rather than communicating with each individual person in a valuable way. So, how can brands intelligently leverage the bevy of marketing channels to better understand and engage customers?

    Winning brands must embrace an omnichannel engagement strategy that’s built specifically for their channel-agnostic customer base. This webinar outlines the key issues in delivering a seamless omnichannel experience and provides actionable tactics that deliver proven ROI.

    You’ll learn:

    * Why today’s marketing automation solutions fall short of customer expectations
    * How winning omnichannel marketing strategies balance push notifications, in-app messages, email, and social communications
    * Why understanding users on a person level, and not device level, is critical in mobile
    * Why “Marketing” is evolving to “Communicating” and how to prepare for that transition

    Register today!

    Speakers:
    Doug Roberge, Strategic Services Consultant, Kahuna
    Gee Chuang, CEO and Founder, Listia
    Jon Cifuentes, Insight Analyst, VentureBeat

    Sponsored by Kahuna
  • Join us for a WebTech Series webcast to learn how you can realize your insights faster using the Hitachi Live Insight Center of Excellence. Hear how we have helped companies along their Social Innovation journey with holistic approaches and deep industry expertise. Ask questions about how we can enable your analytics initiatives and Social Innovation solutions. Find out how to:
    •Start planning a comprehensive big data strategy.
    •Gain consensus for your analytics initiatives.
    •Move forward with your Social Innovation solutions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: What Happens in an Attack?
  • Live at: Jul 23 2012 5:00 pm
  • Presented by: Pierre-Marc Bureau, Malware Researcher at ESET
  • From:
Your email has been sent.
or close
You must be logged in to email this