Remove Authentication Remove Linux Remove Malware Remove Presentation
article thumbnail

Technology Short Take 155

Scott Lowe

Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. Vaughan-Nichols writes about the first malware discovered running on AWS Lambda. This will become even more useful, in my opinion, when Linux support is added.

article thumbnail

The Hacker Mind Podcast: Scanning the Internet

ForAllSecure

Traditional anti-malware research relies on customer systems but what if a particular malware wasn’t on the same platform as your solution software? éveillé from ESET joins The Hacker Mind podcast to talk about the challenges of building his own internet scanner to scan for elusive malware. Marc-Etienne M.Léveillé

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

So we include other telemetry that seeks to authenticate that the entity logging in is who they say they are. So of course when I saw that some researchers were presenting a talk at SecTor 2021 in Toronto on defeating biometrics with artificial intelligence, well I knew I had to talk to them as well. Yeah, I’m a bona fide cynic.

article thumbnail

The Hacker Mind Podcast: Fuzzing Message Brokers

ForAllSecure

Jonathan Knudsen from Synopsys joins The Hacker Mind to discuss his presentation at SecTor 2021 on fuzzing message brokers such as RabbitMQ and VerneMQ, both written in Erlang, demonstrating that any type of software in any environment can still be vulnerable. The trouble is, details of this leaked prematurely.

article thumbnail

The Hacker Mind Podcast: Crimeware As A Service

ForAllSecure

At the time of this podcast, Lockbit accounts for 40% of the ransomware present today and it hits both Windows and Linux machines. Vamosi: Ransomware is the latest trend in malware. It’s a clever way for malware to be monetized. That’s what a criminal malware enterprise looks like today.

Malware 40
article thumbnail

History of Computer Hacking and Cybersecurity Threats: From the 50s to Today

ForAllSecure

In this post, we will explore the history of computer hacking and cybersecurity threats from the 1950s to present day. He used a toy whistle from a cereal box to mimic the tone used by the phone company to authenticate calls. The 1980s also saw the emergence of computer viruses and malware as a significant threat to computer security.

Malware 75