Publication: Lenny Zeltser on Information Security

First reported Aug 29 2014 - Updated Aug 29 2014 - 1 reports

Morse-Style Tap Codes for Mobile Authentication

Authenticating legitimate users of mobile devices in a manner that is both reliable and convenient is hard, which is why companies continue to experiment with approaches that try balance security and convenience. A freshly-minted Coin  app asks users ... [Published Lenny Zeltser on Information Security - Aug 29 2014]
First reported Aug 27 2014 - Updated Aug 27 2014 - 1 reports

First Look at Google's New Domain Registrar

Without much fanfare, Google entered the domain registration business by announcing the private beta of its new  Google Domains service in June 2014. Once invited to join the program, you can use Google Domains to purchase new domains and transfer ... [Published Lenny Zeltser on Information Security - Aug 27 2014]
First reported Aug 13 2014 - Updated Aug 13 2014 - 1 reports

Internet Noise and Malicious Requests to a New Web Server

I set up a brand new web server to see what type of connections it will receive. Since the server had no “production” purpose, all attempts to access it could be considered suspicious at best. Such requests are associated with scans, probes and other ... [Published Lenny Zeltser on Information Security - Aug 13 2014]
First reported Jun 12 2014 - Updated Jun 12 2014 - 1 reports

Attackers Rely on Social Engineering to Activate Macros in Malicious Office Documents

Microsoft Office documents offer a convenient way to infect systems through the use of macros. However, the attacker needs to persuade victims to enable macros after opening the booby trapped file. Social engineering is an important aspect of these attack ... [Published Lenny Zeltser on Information Security - Jun 12 2014]
First reported May 22 2014 - Updated May 22 2014 - 1 reports

New Release of REMnux Linux Distro for Malware Analysis

It’s my pleasure to announce the availability of version 5 of REMnux , a Linux distribution popular among malware analysts. The new release adds lots of exciting free tools for examining malicious software. It also updates many of the utilities that ... [Published Lenny Zeltser on Information Security - May 22 2014]
Entities: Malware, Linux, Decrypt
First reported Apr 13 2014 - Updated Apr 13 2014 - 1 reports

Scammers in Action: Domain Names and Family Resettlement to Australia

"You Have Been Selected for Family Resettlement to Australia," began the email that included the seal of the Embassy of Australia. "You are among the list of nominated for 2014 resettlement visa to Australia." The signature line claimed that the message ... [Published Lenny Zeltser on Information Security - Apr 13 2014]
First reported Mar 27 2014 - Updated Mar 27 2014 - 1 reports

A Series of Introductory Malware Analysis Webcasts

If you are looking to get started with malware analysis , tune into the webcast series I created to illustrate key tools and techniques for examining malicious software. Join the next webcast in the series live on April 17, 2013 and watch the others ... [Published Lenny Zeltser on Information Security - Mar 27 2014]

Quotes

Google Domains allows you to add, edit and delete domain records. In addition, it offers a convenient way to define “ synthetic records " for automatically configuring the domain to use Google App Engine or Google Apps you can also configure URL forwarding. "
"We are conducting an ongoing experiment to map the Internet in its entirety. Our crawling is not malicious in intent and does nothing more than attempt the connection; no further information is mined."
"You Have Been Selected for Family Resettlement to Australia," began the email that included the seal of the Embassy of Australia. "You are among the list of nominated for 2014 resettlement visa to Australia." The signature line claimed that the message had been sent by Hon Thomas Smith and came from "Australia Immigration Section

More Content

All (117) | News (0) | Reports (0) | Blogs (117) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Morse-Style Tap Codes for Mobile Authentication [Published Lenny Zeltser on Information Security - Aug 29 2014]
First Look at Google's New Domain Registrar [Published Lenny Zeltser on Information Security - Aug 27 2014]
Internet Noise and Malicious Requests to a New ... [Published Lenny Zeltser on Information Security - Aug 13 2014]
Attackers Rely on Social Engineering to Activat... [Published Lenny Zeltser on Information Security - Jun 12 2014]
New Release of REMnux Linux Distro for Malware ... [Published Lenny Zeltser on Information Security - May 22 2014]
Scammers in Action: Domain Names and Family Res... [Published Lenny Zeltser on Information Security - Apr 13 2014]
A Series of Introductory Malware Analysis Webcasts [Published Lenny Zeltser on Information Security - Mar 27 2014]
Mastering 4 Stages of Malware Analysis [Published Lenny Zeltser on Information Security - Mar 13 2014]
I was one of the guests at the recent Forensic ... [Published Lenny Zeltser on Information Security - Feb 25 2014]
Making Sure Your Security Advice and Decisions ... [Published Lenny Zeltser on Information Security - Feb 14 2014]
Malware: Whom or What Are We Fighting? [Published Lenny Zeltser on Information Security - Feb 10 2014]
Participating in the Eternal Cycle of Cybersecu... [Published Lenny Zeltser on Information Security - Feb 07 2014]
Security Trends and Your Career Plans [Published Lenny Zeltser on Information Security - Feb 04 2014]
How to Get a Windows XP Mode Virtual Machine on... [Published Lenny Zeltser on Information Security - Nov 15 2013]
What to Do About Password-Sharing? [Published Lenny Zeltser on Information Security - Sep 12 2013]
Potential Security Applications of the iPhone 5... [Published Lenny Zeltser on Information Security - Sep 11 2013]
Teaching Malware Analysis and the Expanding Cor... [Published Lenny Zeltser on Information Security - Aug 09 2013]
Researching Scams Helps Understand Human Vulner... [Published Lenny Zeltser on Information Security - Jul 30 2013]
Looking for Anomalies in Check Overpayment Scam... [Published Lenny Zeltser on Information Security - Jul 26 2013]
How the Digital Certificates Ecosystem is Being... [Published Lenny Zeltser on Information Security - Jul 23 2013]
How Digital Certificates Are Used and Misused [Published Lenny Zeltser on Information Security - Jul 22 2013]
What Happens After You've Set Up Google Inactiv... [Published Lenny Zeltser on Information Security - Jul 16 2013]
The Notion of a Honeypot Persona [Published Lenny Zeltser on Information Security - Jul 15 2013]
Why Organizations Don't Prepare for Information... [Published Lenny Zeltser on Information Security - Jul 06 2013]
Technical and Political Boundaries of Security ... [Published Lenny Zeltser on Information Security - Jul 02 2013]
Understanding Tech Trends to Explain the Evolut... [Published Lenny Zeltser on Information Security - Jun 30 2013]
Digital Forensics and InfoSec Career Advice Fro... [Published Lenny Zeltser on Information Security - Jun 05 2013]
What Anomalies Trigger The LinkedIn Sign-In Ver... [Published Lenny Zeltser on Information Security - May 23 2013]
Cyberattack Activities of a Group in India [Published Lenny Zeltser on Information Security - May 22 2013]
Several Posts on Malware Analysis Tools [Published Lenny Zeltser on Information Security - May 18 2013]
1 2 3 4
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Morse-Style Tap Codes for Mobile Authentication [Published Lenny Zeltser on Information Security - Aug 29 2014]
Authenticating legitimate users of mobile devices in a manner that is both reliable and convenient is hard, which is why companies continue to experiment with approaches that try balance security and convenience. A freshly-minted Coin  app asks users ...
First Look at Google's New Domain Registrar [Published Lenny Zeltser on Information Security - Aug 27 2014]
Without much fanfare, Google entered the domain registration business by announcing the private beta of its new  Google Domains service in June 2014. Once invited to join the program, you can use Google Domains to purchase new domains and transfer ...
Internet Noise and Malicious Requests to a New ... [Published Lenny Zeltser on Information Security - Aug 13 2014]
I set up a brand new web server to see what type of connections it will receive. Since the server had no “production” purpose, all attempts to access it could be considered suspicious at best. Such requests are associated with scans, probes and other ...
Attackers Rely on Social Engineering to Activat... [Published Lenny Zeltser on Information Security - Jun 12 2014]
Microsoft Office documents offer a convenient way to infect systems through the use of macros. However, the attacker needs to persuade victims to enable macros after opening the booby trapped file. Social engineering is an important aspect of these attack ...
New Release of REMnux Linux Distro for Malware ... [Published Lenny Zeltser on Information Security - May 22 2014]
It’s my pleasure to announce the availability of version 5 of REMnux , a Linux distribution popular among malware analysts. The new release adds lots of exciting free tools for examining malicious software. It also updates many of the utilities that ...
1 2 3 4 5 6 7 8 9 10 ...
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.