Sign up to our newsletter
Greetings, friends and fiends.
It's been a while since I've been able to blog: I've been trying out one of these vacation thingies that I keep reading about in travel magazines. (Well, my wife does, and she tells me when I need a holiday, presumably as my conversations get grouchier.) But I see that my colleagues in the Research team have keeping you well supplied with reading material.
Another of my colleagues, Juraj Malcho, Head of Lab in Slovakia, the engine room of our product line, has also been busy on the writing front (I don't know how he fits it in with all that other work). In an article for CTO Edge, he talks about the use of social engineering in malware. Social engineering and malware have been enjoying a dangerous liaison for a long time, of course, but it's never a bad time ot point out that psychological manipulation remains the most successful vector for malware infection (and other attacks, of course), and the article includes some very apposite examples of the technique.
And dare I mention that it's platform-independent?
David Harley CISSP FBCS CITP
Director of Malware Intelligence
ESET Threatblog (TinyURL with preview enabled): http://preview.tinyurl.com/esetblog
ESET Threatblog notifications on Twitter:
ESET White Papers Page: http://www.eset.com/download/whitepapers.php
Securing Our eCity community initiative: http://www.securingourecity.org/
Author David Harley, ESET