No Image

Will the threat of viruses, malwares get more serious in the upcoming years?

  We have seen two years ago the first serious attempt to attack a nuclear power plant with a malware (Stuxnet) and the entire security industry as well as governments have started to take the entire issue very seriously. Basic utilities like electricity, water supply, gas for our cars and even food supplies depend on the availability of computer networks. It is to be expected that if there are assets which are important to someone in the Internet, there will be eventually also someone who will try to misuse them. Yes, the trend from last years is pretty clear in regard to cyberthreats. There will be no longer millions of malware out there, but those that will continue to exist or will newly appear, will be very serious threats. More and more is being done with help of computers and networks and even in households there are more and more devices connected to the Internet. “Serious threat” needs also to be redefined in this light. What five to ten years ago was considered “serious” – defacing websites, trojans that were executed on certain dates to spread some messages –  can’t be compared with what is today being considered serious: human lives…

No Image

“Not all AV software are the same” – CompTIA Security+ 2008

CompTIA Security+ 2008, page 99, Chapter Antivirus Not all AV software is the same. Free AV software that is available for download through the Internet will typically only look for viruses in standard files. However, most commercial AV software will also look for Trojans, worms, macro viruses, and adware in standard files as well as in compressed (.ZIP) files. In which decade are you guys from CompTIA living ? *Any* AV product looks for those malware in all files. Maybe you should update the book 😉

No Image

Viruses and Digital Signatures

Very interesting stuff: Although the files are signed, they are signed using an unauthenticated CA (Certificate Authority) which is masquerading as Verisign. A CA is a trusted third party that issues and signs the certificate and vouches for the authenticity of the file. Each CA should be registered and therefore recognized globally as a trusted signer. The signature on the certificate is verified by the signer’s public key.

%d bloggers like this:

By continuing to use the site, you agree to the use of cookies and to its Privacy Policy more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.