Malware

You are the weakest link…

Greetings, friends and fiends. It’s been a while since I’ve been able to blog: I’ve been trying out one of these vacation thingies that I keep reading about in travel magazines. (Well, my wife does, and she tells me when I need a holiday, presumably as my conversations get grouchier.) But I see that my

Greetings, friends and fiends.

It’s been a while since I’ve been able to blog: I’ve been trying out one of these vacation thingies that I keep reading about in travel magazines. (Well, my wife does, and she tells me when I need a holiday, presumably as my conversations get grouchier.) But I see that my colleagues in the Research team have keeping you well supplied with reading material.

Another of my colleagues, Juraj Malcho, Head of Lab in Slovakia, the engine room of our product line, has also been busy on the writing front (I don’t know how he fits it in with all that other work). In an article for CTO Edge, he talks about the use of social engineering in malware. Social engineering and malware have been enjoying a dangerous liaison for a long time, of course, but it’s never a bad time ot point out that psychological manipulation remains the most successful vector for malware infection (and other attacks, of course), and the article includes some very apposite examples of the technique.

And dare I mention that it’s platform-independent?

David Harley CISSP FBCS CITP
Director of Malware Intelligence

ESET Threatblog (TinyURL with preview enabled): http://preview.tinyurl.com/esetblog
ESET Threatblog notifications on Twitter:
http://twitter.com/esetresearch; http://twitter.com/ESETblog
ESET White Papers Page: http://www.eset.com/download/whitepapers.php

Securing Our eCity community initiative: http://www.securingourecity.org/

Also blogging at:
http://smallbluegreenblog.wordpress.com/
http://avien.net/blog
http://blogs.securiteam.com
http://blog.isc2.org/
http://macvirus.com/

To Top

Pin It on Pinterest

Share This