Access "Malware analysis tools and techniques failing but researchers aim for improvement"
Hardened cryptographic algorithms and other defensive capabilities are making reverse engineering and analysis increasingly difficult for malware researchers. But some researchers are putting increased vigor into creating tools to bolster malware analysis and in turn create better security technologies. Security researchers attending the 2012 Black Hat Briefings acknowledged that the industry is failing to better understand the capabilities being deployed by malware authors. That lack of understanding is resulting in less than stellar security technologies, says Rodrigo Branco, director of vulnerability and malware research at Redwood City, Calif.-based Qualys. Attackers are penetrating corporate networks because they are consistently evading security defenses with sophisticated methods, Branco says. Meanwhile, enterprises are not stepping up to invest in staff to isolate and better analyze incidents. "It's amazing to see that an industry that is 15 years old maybe even more has not documented the techniques that it is fighting against," he says. "This ... Access >>>
Premium Content for Free.
A new framework for preventing XSS attacks
by Joseph Bugeja and Geraint Price
Understand how cross-site scripting attacks work and how to prevent them.
Security as a Service: Benefits and risks of cloud-based security
by Joseph Granneman
Know the pros and cons to cloud-based security services before making the leap.
- A new framework for preventing XSS attacks by Joseph Bugeja and Geraint Price
Malware analysis tools and techniques failing but researchers aim for improvement
by Robert Westervelt
Malware analysis is falling short but some security researchers are working to reverse the trend.
Mobile application security best practices in a BYOD world
by Russ McRee, Contributor
Mobile applications are proliferating in the enterprise, posing new risks to enterprises and requiring mitigation.
- Malware analysis tools and techniques failing but researchers aim for improvement by Robert Westervelt
Marcus Ranum chat: The information security metrics dilemma
by Marcus J. Ranum, Contributor
Security expert Marcus Ranum goes one-on-one with Alex Hutton about the problems with security metric efforts.
Reflections on changing information security trends
by Michael S. Mimoso, Editorial Director
Veteran security journalist reminisces about covering the industry and says farewell to TechTarget.
BYOD policy: The costs and potential ROI
by Andrew Braunberg, Contributor
Security pros need to understand the total costs and potential ROI of BYOD policies.
- Marcus Ranum chat: The information security metrics dilemma by Marcus J. Ranum, Contributor
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...