Publication: Lenny Zeltser on Information Security

First reported Jun 12 2014 - Updated Jun 12 2014 - 1 reports

Attackers Rely on Social Engineering to Activate Macros in Malicious Office Documents

Microsoft Office documents offer a convenient way to infect systems through the use of macros. However, the attacker needs to persuade victims to enable macros after opening the booby trapped file. Social engineering is an important aspect of these attack ... [Published Lenny Zeltser on Information Security - Jun 12 2014]
First reported May 22 2014 - Updated May 22 2014 - 1 reports

New Release of REMnux Linux Distro for Malware Analysis

It’s my pleasure to announce the availability of version 5 of REMnux , a Linux distribution popular among malware analysts. The new release adds lots of exciting free tools for examining malicious software. It also updates many of the utilities that ... [Published Lenny Zeltser on Information Security - May 22 2014]
Entities: Malware, Linux, Decrypt
First reported Apr 13 2014 - Updated Apr 13 2014 - 1 reports

Scammers in Action: Domain Names and Family Resettlement to Australia

"You Have Been Selected for Family Resettlement to Australia," began the email that included the seal of the Embassy of Australia. "You are among the list of nominated for 2014 resettlement visa to Australia." The signature line claimed that the message ... [Published Lenny Zeltser on Information Security - Apr 13 2014]
First reported Mar 27 2014 - Updated Mar 27 2014 - 1 reports

A Series of Introductory Malware Analysis Webcasts

If you are looking to get started with malware analysis , tune into the webcast series I created to illustrate key tools and techniques for examining malicious software. Join the next webcast in the series live on April 17, 2013 and watch the others ... [Published Lenny Zeltser on Information Security - Mar 27 2014]

Quotes

"You Have Been Selected for Family Resettlement to Australia," began the email that included the seal of the Embassy of Australia. "You are among the list of nominated for 2014 resettlement visa to Australia." The signature line claimed that the message had been sent by Hon Thomas Smith and came from "Australia Immigration Section
...Perhaps the stages could be represented by a “ wash, rinse, repeat " cycle, that could only be interrupted when the analyst runs out of time. "
...In another example, a malicious site enticed visitors to click by claiming that " 99% of people can’t watch this video for more than 25 seconds ."

More Content

All (114) | News (0) | Reports (0) | Blogs (114) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Attackers Rely on Social Engineering to Activat... [Published Lenny Zeltser on Information Security - Jun 12 2014]
New Release of REMnux Linux Distro for Malware ... [Published Lenny Zeltser on Information Security - May 22 2014]
Scammers in Action: Domain Names and Family Res... [Published Lenny Zeltser on Information Security - Apr 13 2014]
A Series of Introductory Malware Analysis Webcasts [Published Lenny Zeltser on Information Security - Mar 27 2014]
Mastering 4 Stages of Malware Analysis [Published Lenny Zeltser on Information Security - Mar 13 2014]
I was one of the guests at the recent Forensic ... [Published Lenny Zeltser on Information Security - Feb 25 2014]
Making Sure Your Security Advice and Decisions ... [Published Lenny Zeltser on Information Security - Feb 14 2014]
Malware: Whom or What Are We Fighting? [Published Lenny Zeltser on Information Security - Feb 10 2014]
Participating in the Eternal Cycle of Cybersecu... [Published Lenny Zeltser on Information Security - Feb 07 2014]
Security Trends and Your Career Plans [Published Lenny Zeltser on Information Security - Feb 04 2014]
How to Get a Windows XP Mode Virtual Machine on... [Published Lenny Zeltser on Information Security - Nov 15 2013]
What to Do About Password-Sharing? [Published Lenny Zeltser on Information Security - Sep 12 2013]
Potential Security Applications of the iPhone 5... [Published Lenny Zeltser on Information Security - Sep 11 2013]
Teaching Malware Analysis and the Expanding Cor... [Published Lenny Zeltser on Information Security - Aug 09 2013]
Researching Scams Helps Understand Human Vulner... [Published Lenny Zeltser on Information Security - Jul 30 2013]
Looking for Anomalies in Check Overpayment Scam... [Published Lenny Zeltser on Information Security - Jul 26 2013]
How the Digital Certificates Ecosystem is Being... [Published Lenny Zeltser on Information Security - Jul 23 2013]
How Digital Certificates Are Used and Misused [Published Lenny Zeltser on Information Security - Jul 22 2013]
What Happens After You've Set Up Google Inactiv... [Published Lenny Zeltser on Information Security - Jul 16 2013]
The Notion of a Honeypot Persona [Published Lenny Zeltser on Information Security - Jul 15 2013]
Why Organizations Don't Prepare for Information... [Published Lenny Zeltser on Information Security - Jul 06 2013]
Technical and Political Boundaries of Security ... [Published Lenny Zeltser on Information Security - Jul 02 2013]
Understanding Tech Trends to Explain the Evolut... [Published Lenny Zeltser on Information Security - Jun 30 2013]
Digital Forensics and InfoSec Career Advice Fro... [Published Lenny Zeltser on Information Security - Jun 05 2013]
What Anomalies Trigger The LinkedIn Sign-In Ver... [Published Lenny Zeltser on Information Security - May 23 2013]
Cyberattack Activities of a Group in India [Published Lenny Zeltser on Information Security - May 22 2013]
Several Posts on Malware Analysis Tools [Published Lenny Zeltser on Information Security - May 18 2013]
Anticipating Cyber Threats Beyond APT [Published Lenny Zeltser on Information Security - May 15 2013]
Speeding Up The Clock For Malware Analysis... [Published Lenny Zeltser on Information Security - May 02 2013]
New Release of REMnux Linux Distro for Malware ... [Published Lenny Zeltser on Information Security - Apr 09 2013]
1 2 3 4
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Attackers Rely on Social Engineering to Activat... [Published Lenny Zeltser on Information Security - Jun 12 2014]
Microsoft Office documents offer a convenient way to infect systems through the use of macros. However, the attacker needs to persuade victims to enable macros after opening the booby trapped file. Social engineering is an important aspect of these attack ...
New Release of REMnux Linux Distro for Malware ... [Published Lenny Zeltser on Information Security - May 22 2014]
It’s my pleasure to announce the availability of version 5 of REMnux , a Linux distribution popular among malware analysts. The new release adds lots of exciting free tools for examining malicious software. It also updates many of the utilities that ...
Scammers in Action: Domain Names and Family Res... [Published Lenny Zeltser on Information Security - Apr 13 2014]
"You Have Been Selected for Family Resettlement to Australia," began the email that included the seal of the Embassy of Australia. "You are among the list of nominated for 2014 resettlement visa to Australia." The signature line claimed that the message ...
A Series of Introductory Malware Analysis Webcasts [Published Lenny Zeltser on Information Security - Mar 27 2014]
If you are looking to get started with malware analysis , tune into the webcast series I created to illustrate key tools and techniques for examining malicious software. Join the next webcast in the series live on April 17, 2013 and watch the others ...
Mastering 4 Stages of Malware Analysis [Published Lenny Zeltser on Information Security - Mar 13 2014]
Examining malicious software involves a variety of tasks, some simpler than others. These efforts can be grouped into stages based on the nature of associated malware analysis techniques. Layered on top of each other, these stages form a pyramid that ...
1 2 3 4 5 6 7 8 9 10 ...
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.