Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

Focused Black Hat 2013 Trainings Examine Incident Response, Malware

A posting from Dark Reading In there  Security  management section: Verizon’s 2013 DBIR indicates that 40% of breaches involved malware, and rapid analysis often falls to incident responders. Malware Analysis: Black Hat Edition provides a rapid intro to the tools and methodologies of Windows malware analysis. Attendees will learn how to observe malware’s actions through disassembly and debugging, extract host […]

BIOS Bummer: New Malware Can Bypass BIOS Security

A posting from Dark Reading in there Vulnerability and Threat section: As more hardware vendors seek to implement the new NIST 800-155 specification that was designed to make the start-up BIOS firmware on our PCs and laptops more secure, they may need to rethink the security assumptions upon which the standard depends. A trio of researchers from […]

Focused Black Hat 2013 Trainings Examine Incident Response, Malware

A posting from Dark Reading In there  Security  management section: Verizon’s 2013 DBIR indicates that 40% of breaches involved malware, and rapid analysis often falls to incident responders. Malware Analysis: Black Hat Edition provides a rapid intro to the tools and methodologies of Windows malware analysis. Attendees will learn how to observe malware’s actions through disassembly and debugging, extract host […]

BIOS Bummer: New Malware Can Bypass BIOS Security

A posting from Dark Reading in there Vulnerability and Threat section: As more hardware vendors seek to implement the new NIST 800-155 specification that was designed to make the start-up BIOS firmware on our PCs and laptops more secure, they may need to rethink the security assumptions upon which the standard depends. A trio of researchers from […]