| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
While most people panic at the sight of a ransomware note, many of the malware families are actually weak and feeble. Some don't even work at all. Based off long-term research, this talk will poke fun at some weird and unusual ransomware that are fake or so badly written that they're easily bypassed and recovered from. Learn which threats are real, which are mildly painful, and which can be laughed off, and how to tell the difference. Brian Baskin is a senior threat researcher with Carbon Black's Threat Analysis Unit, with a specialty in digital forensics, incident response, and malware analysis. Brian was previously an intrusions and malware analyst/reverse engineer for the Defense Computer Forensics Laboratory, part of the Department of Defense Cyber Crime Center. For nearly 15 years He has worked to research, develop, and train responses to large-scale attacks. Brian devotes his time to researching threats, reverse engineering, and developing security tools. He has co-authored multiple books on computer security and has developed widely-used software to allow for more efficient intrusion and malware analysis.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast