Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
MILPITAS, CA -- (Marketwired) -- 08/04/14 -- FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today's advanced cyber attacks, today announced it is hosting three briefings at Black Hat USA 2014: an advanced attack against Android phones; how to identify attacks leveraging Microsoft PowerShell; and how Planet Earth has become hackers' playground via command and control operations.
The first briefing will address "Sidewinder Targeted Attacks," also known as VIP attacks, which target victims by intercepting location information reported from aggressive ad libraries that utilize the Android platform. These aggressive ad libraries leak user information and allow for Android devices to be hijacked by attackers to gain total control (for example, send texts, turn on/off cameras and microphones and much more). To learn more, attend:
What: Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs
Who: Tao Wei, senior staff research scientist, FireEye and Yulong Zhang, senior software research engineer, FireEye
When: August 7th, 10:15 - 11:15am
Where: Mandalay Bay, South Seas GH
The second briefing will provide an overview of how Microsoft admin tools such as PowerShell have become strong surrogates for malware and how to remedy this issue. This presentation will focus on common attack patterns performed through PowerShell, and offer advice on identifying and preventing such attacks. To learn more, attend:
What: Investigating PowerShell Attacks
Who: Ryan Kazanciyan, technical director, Mandiant and author Matt Hastings, consultant, Mandiant
When: August 7th, 3:30 - 4:30pm
Where: Mandalay Bay, South Seas GH
The third briefing draws a new map of Planet Earth, based not on traditional parameters, but on hacker command and control (C2) communications. The primary data points used in this worldwide cyber survey are more than 30 million malware callbacks to over 200 countries and territories over an 18-month period, from January 2013 to June 2014. To learn more, attend:
What: Leviathan: Command And Control Communications On Planet Earth
Who: Kevin Thompson, threat analyst, FireEye and Kenneth Geers, independent researcher and former senior global threat analyst, FireEye
When: August 7th, 10:15 - 11:15am
Where: Mandalay Bay, South Seas F
Also visit the FireEye booth (#411) to learn more about emerging cybersecurity threats. Copies of the newly released Incident Response & Computer Forensics, Third Edition by Jason Luttgens, Matthew Pepe, and Kevin Mandia will also be available at the booth.
About FireEye, Inc.
FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 2,200 customers across more than 60 countries, including over 130 of the Fortune 500.
© 2014 FireEye, Inc. All rights reserved. FireEye and Mandiant are registered trademarks or trademarks of FireEye, Inc. in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.
Media Contact
Vitor De Souza
(415) 699-9838
vitor.desouza@fireeye.com
Investor Contact
Kate Patterson
FireEye, Inc.
408-321-4957
kate.patterson@fireeye.com
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs