LIVE Webinar: Led by IBM's Senior Cyber Security Strategist, Etay Maor
Today everything is for Sale - anyone (amateur or professional hacker) can access or purchase a wide range of tools enabling them to leverage the latest application vulnerabilities to target their victims.
When discussing malware, we tend to focus on the technical aspects of how a specific malicious program operates on an infected system - and the processes executed by a malware variant. These could range from how it latches onto an infected device to how it manipulates the user into providing personal credentials, but truly this is just a small subset of the cybercrime ecosystem.
As little as 8 to 10 years ago, a single hacker would be responsible for everything from coding the malware to distributing it - including setting up command-and-control (C&C) servers, identifying infection points, working with money mules and more. Today, the whole process, or at least each individual element, can be easily outsourced. Everything is for Sale!
Register today for this complimentary webcast where you will learn about the strategies and tactics to counter the malware lifecycle and cybercrime underground.
Maor leads fraud fighting and threat awareness projects for Trusteer, an IBM Company. A security evangelist, he regularly presents at industry events and academic master classes as well as volunteer for educational security awareness programs. Previously, Maor was the Head of RSA's Cyber Threats Research Labs where he managed malware research and intelligence teams and was part of cutting edge security research. He holds a BA in Computer Science and a MA in Counter Terrorism and Cyber Terrorism, and teaches an Introduction to Cyber Security course and a member of the International Institute for Counter Terrorism where he focuses on cyber terrorism research.