tag
Jeff Debrosse

H.R.4098 – Secure Federal File Sharing Act & P2P

Yesterday the US House of Representatives approved legislation that would specify and limit open-network P2P usage by government employees and contractors on systems authorized to connected to federal computers and network resources. As with everything in life, there are exceptions. Requests to use open-network P2P applications can be made for the following purposes: necessary for

AMTSO and RSA

Greetings, friends and fiends. I've been uncharacteristically quiet for the past couple of weeks, due to the AMTSO workshop last week in Santa Clara. There was, as usual, some lively discussion: though no papers were approved at the meeting, some are close enough to finished to be voted on shortly. (See also the AMTSO blog

Operation Cyber ShockWave

While serving in the Marine Corps, one activity that I felt was effective in preparing both myself and my unit to be able to handle real-world scenarios, was getting as much experience as possible from military training exercises. In most cases multiple branches worked together or, as in the case with NATO exercises, multiple countries

Haiti: more resources

Jeff Debrosse, ESET's Senior Director of Research, has published some further resources on his personal blog at http://jeffdebrosse.wordpress.com/2010/01/15/haiti-info-and-update/ (help resources and security resources). As he explains there, Jeff is personally and emotionally closer to this tragedy than most of us, and I hope that his family all turn up safe and sound. I've also received pointers to

December’s Virus Bulletin

 I notice that our own Jeff Debrosse, having joined the ranks of ESET presenters at Virus Bulletin conferences this year with our paper on "Behaviour Analysis for the Next Decade"  (http://www.eset.com/threat-center/blog/2009/12/02/malice-through-the-looking-glass-conference-paper), has also swelled the ranks of ESET contributors to the magazine this month, with an opinion piece on “Cybersecurity awareness for the next generation.”.

Malice Through The Looking Glass: Conference Paper

Have you checked our white papers page at http://www.eset.com/download/whitepapers.php lately? We've recently put up a paper by Jeff Debrosse and David Harley that was presented at the 19th Virus Bulletin Conference in Geneva in 2009, and called "Malice Through the Looking Glass: Behaviour Analysis for the Next Decade".   The paper was first published in Virus

Paedophilia and the “Trojan Defence”

This is a follow-up of sorts to Jeff Debrosse's thoughtful post recently on the problem of possible conviction for the possession of illegal paedophiliac material of individuals who had no knowledge of its presence. More recently, a tweet by Bob McMillan drew my attention to an article by Geoff Liesik on "Authorities scoff at 'child porn

The Blame Game

I recently learned a new acronym: SODDI (Some Other Dude Did It). What this refers to is the defense that criminals routinely use (plausible deniability) – and even more so when it comes to illicit activities on the Internet. On Sunday, November 8th 2009 the Associated Press published an article regarding an individual that was

Postcard from Geneva

Virus Bulletin 2009 is now in full swing, though meetings and other issues have kept me from seeing as much as I’d like. Still, excellent opening and keynote speeches, and a very interesting talk on cyber-insurance from Pascal Lointier. (A bit of a first for me: though I’ve been attending VB most years since 1996 and

Heartland and Shadowlands

This is a follow-up up to my previous blog regarding the price of data loss. Heartland Payment Systems lost another 30% share value a few days ago (actually, 25th February, but it’s been a busy week!) – down to $5.34/share (at the beginning of 2009 – prior to the breach they were between $16-$18 per

Enough to Break your Heartland: Fraud and Malware

MSNBC put up some interesting comment on the Heartland security breach. Since they’ve put some emphasis on the involvement of malware in the breach, it’s worth making a few points. * Heartland was PCI compliant when the breach occurred. The PCI DSS v1.2 Requirement #5.1.1 states: “Ensure that all anti-virus programs are capable of detecting,

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

26 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.