logoSign upLog in
Information Security Professionals - beBee

Information Security Professionals

~ 100 buzzes
Buzzes
  1. ProducerBob Carver

    Bob Carver

    23/03/2017
    SC Magazine Virtual Conference - Leveraging Threat Intelligence
    SC Magazine Virtual Conference - Leveraging Threat IntelligenceTo see this Virtual Conference follow this...
    Relevant
  2. ProducerBob Carver

    Bob Carver

    22/01/2017
    Eleven Cybersecurity Predictions and a Wish List for 2017
    Eleven Cybersecurity Predictions and a Wish List for 2017Copyright © 2016 Bob Carver CISM, CISSP, M.S.Let's start with some of things I got right in 2016:IoT - This was #1 on my list for 2016 Predictions last year. The beginning of IoT security problems have been seen and felt this year. The Mirai botnet...
    Relevant
  3. ProducerRoman Romanenco

    Roman Romanenco

    14/09/2016
    Mac OS X Environment for iOS Testing
    Mac OS X Environment for iOS TestingAuthor: Roman RomanencoStage 1: Mac OS VM Set-up for Testing PrerequisitesOracle VirtualBox or VMware WorkstationVirtualization enabled in BIOs*Alternatively you may use a Mac 1. Download Mac OS .iso image:(OS X 10.11 El...
    Relevant
  4. ProducerRoman Romanenco

    Roman Romanenco

    19/08/2016
    Deconstructing the Ransomware Kill Chain
    Deconstructing the Ransomware Kill Chain(Part 2 in a Series on Ransomware) Author: Roman Romanenco In our last blog, The Proliferation of Ransomware, we covered the ransomware business and its continual growth at the expense of beleaguered enterprise networks and individual...
    Relevant
  5. ProducerRoman Romanenco

    Roman Romanenco

    10/08/2016
    Unwrap Your Malware
    Unwrap Your MalwareIntro to Wrappers Wrapped files have a script or executable in their body, which they drop and run upon execution; e.g., an EXE file drops a batch script in the case that follows. Typically wrappers (EXE converters) create EXE files from Python...
    Relevant
  6. Roman Romanenco

    Roman Romanenco

    03/08/2016
    All it takes is a 1% success rate to make it a booming business..
    Roman Romanenco
    Encryption ransomware now 'tried and trusted' attacker business model | ZDNet
    www.zdnet.com PhishMe's Q2 malware review claims that ransomware is now firmly rooted in the attacker...
    Relevant
  7. ProducerRoman Romanenco

    Roman Romanenco

    02/08/2016
    The Proliferation of Ransomware
    The Proliferation of RansomwareAuthor: Roman Romanenco (Part 1 in a Series on Ransomware)Ransomware has frequently appeared in the news lately due to high-profile incidents at hospitals and businesses and the sheer volume of ransomware campaigns in the wild. Multiple hospitals...
    Relevant

    Comments

    Javier 🐝 beBee
    02/08/2016 #1 Javier 🐝 beBee
    Welcome to beBee!, @Jorge Lázaro Molina