Information Security

Beware: Malware Crossing! Organized Cybercrime Comes to Town

Play
Play
Share!

Share this Podcast

MyCast

MyCast

MyCast Subscription

Information Security

Caleb Barlow

IBM Massachusetts Laboratory

Description: IT Security Podcast from IBM

Most Recent Post

Beware: Malware Crossing! Organized Cybercrime Comes to Town

Play Download media
One of the most dominant trends observed in the cybercrime during 2015 was the spread of organized crime groups to new territories. Using banking Trojans to attack banks in new geographies is a significant step because it is considered to be part of the malware’s evolution. Before they can venture into countries they never targeted before, crime groups have to invest in an adequate preparatory stage that includes reconnaissance of the banking systems in that geography. They also have to build or pay for the major components of amassing a botnet in that area: spam campaigns in the corresponding language using suitable social engineering ploys, web injections to match language and transaction authentication requirements, and local money mules they can rely on for moving the stolen money to the hands of the attackers. In this podcast we will examine some of the most impactful crossings made by malware in 2015, and unsurprisingly learn that all of them were made by major organized cybercrime groups.

Last 5 Posts

Security, Mobile & Cloud - Caleb Barlow

Play Download media
Security, Mobile & Cloud - Caleb Barlow...

Data at Risk - Is there a weakness in self-encrypting hard drives?

Play Download media
Self-encrypting hard drives (SEDs) have been dubbed the security industry’s best-kept secret, but is the data inside really secure?

With its ability to accelerate the drive-redeployment process, SEDs have been rising in popularity. Tune into this podcast to hear Rick Robinson, IBM Security Product...

Containerization in a DevOps World: Can AppSec Keep Pace?

Play Download media
Containerization (like Docker and IBM Containers) takes application portability to a new level. Applications can be packaged with everything they need to run for simplified, high-velocity deployment. By using native separation within the OS (Linux or Windows) organizations get many of the benefits o...

IoT Security: Reality or Thriller Plot Threats?

Play Download media
When researchers discover vulnerabilities in Internet of Things (IoT) devices, the media hypes the consequences as if the movie "Maximum Overdrive" has jumped off the big screen and into reality. Will your connected car refuse to respond to your stabs at the brake pedal? Will soda machines start sho...

Tips to Protect Your Mobile Environment

Play Download media
Organizations are constantly faced with evolving mobile technologies as well as finding new ways to secure them. The challenge is determining which mobile security strategy best fits your company's needs now and in the future. In this session, you will discover the key considerations for deploying a...

Guest Book