The Evolution of Malware Encryption Part I: Basic Malware Encryption

By Christopher Elisan, Prinicipal Malware Scientist, RSA FirstWatch We, the RSA FirstWatch team, are always at the forefront of solving the latest malware problems –one of those is malware encryption. Malware encryption is not new. It has been around since the DOS days, but has simply evolved to address the antivirus solutions designed to beat…

The Space Between the 1s and 0s – Redux

A few months ago, I wrote a short blog  using the “space between the 1s and 0s” as a metaphor to discuss dimensions of data that are beyond just the digits sitting on the disk drive.  These dimensions included how the data was created, who created it and why it was created along with the…

Got an Extra $40,000 Lying Around? Carberp is Back on the Market!

By Limor S Kessem, Cybercrime and Online Fraud Communications Specialist, RSA Not two weeks after Citadel’s vendor and spokesperson got banned from the largest Russian-speaking cybercrime community, members from the Carberp Trojan team have resurfaced, scurrying to capture some of the underground limelight. In a surprising move that came about earlier this week, team Carberp…

The Digital Universe and the Smart Grid

Among the materials associated with their just-released report on the Digital Universe, IDC has just posted a new Youtube video of John Gantz and David Reinsel, called “The Digital Universe and the Internet of Things,” discussing the implications of this massive explosion of data. John mentions the Smart Grid as an example of machine-generated information. The…

Investing in Information Security for the Digital Universe

IDC has just released an important new study by John Gantz and David Reinsel on The Digital Universe in 2020 that includes an important discussion of the security and privacy implications for the explosion of data in the digital universe. As the report calls out, “The rise in mobility and participation in social networks, the…

Citadel’s Steward Banned from Underground Venues

By Limor Kessem Those following deep-web cybercrime communities know, and have borne witness to, the fate of black hat developers who take on the creation of commercial banking Trojans. Starting with Zeus’ creator “Slavik” and SpyEye’s “Gribodeamon,” developers work overtime to get on the fast track to 6-figure salaries and underground fame. On the way…

Applying Security Intelligence to Your Enterprise Threat Mitigation Program – Introduction

Intelligence is no longer solely relegated to the world of the clandestine.  It is no longer the exclusive domain of roguish characters featured in heart pounding novels nor is it the sole dominion of the prototypical ‘geek’ pounding away on a keyboard at a secret government facility (or van) near you.  No. Threat  Intelligence is…

BYOD Are We Still Not Getting It Right?

Continuing on my recent blogs on BYOD, I thought I would share some interesting statistics from this year’s PwC Information Security Breaches Survey. 75% of large businesses allow staff to use smart phones and tablets to connect to their systems yet only 39% ensure that data on these smart phones is encrypted. Mobile devices are…