Monday, September 17, 2018

How studying the black hat community can help enterprises

TechTarget
Latest Technology News & Expert Advice     September 17, 2018
TechTarget
Issue Highlights:
How studying the black hat community can help enterprises
SamSam ransomware: How can enterprises prevent an attack?
Robot social engineering works because people personify robots
How does the SynAck ransomware use Process Doppelgänging?
Researchers bring back cold boot attacks on modern computers
How studying the black hat community can help enterprises
White hat hackers often assimilate themselves into the black hat community to track the latest threats. Discover how this behavior actually benefits the enterprise with David Geer.
SamSam ransomware: How can enterprises prevent an attack?
SamSam ransomware infected the Colorado DOT after hitting hospitals, city councils and companies. Learn how this version differs from those we've seen in the past.
Robot social engineering works because people personify robots
Brittany 'Straithe' Postnikoff studied robot social engineering and found personification of robots can lead to effective attacks, regardless of whether or not AI is involved.
How does the SynAck ransomware use Process Doppelgänging?
A technique called Process Doppelgänging was used by the SynAck ransomware to bypass security software. Expert Michael Cobb explains how this technique works and why it's unique.
Researchers bring back cold boot attacks on modern computers
The idea of cold boot attacks began ten years ago, but researchers at F-Secure found that the attack can be used on modern computers to steal encryption keys and other data.
This newsletter is published by TechTarget.

TechTarget Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe
TechTarget

No comments: