Gary, Haroon, et al,
The comment "welcome to the real world" from a friend a while back comes to
mind. I think the reality of what we, as security types, "do" versus the
perception that we "sell" to those who don't understand in order to get funding
clashes heavily. Sadly we give up a piece o
The good old dancing pigs rear their oinking heads...
http://en.wikipedia.org/wiki/Dancing_pigs
http://securingjava.com/
gem
On 3/26/11 2:04 PM, "Kevin W. Wall" wrote:
>On 03/26/2011 01:12 PM, Gunnar Peterson wrote:
>> Advanced = goes through firewall
>> Persistent = tried more than once
>> Th
Hi everyone,
Assuming that "are we missing DEP and assorted userland exploit
mitigations" for the web is not a rhetorical question, indeed assorted
technologies based on randomized instruction sets have been researched
and I have seen PoC solutions circa 2004 (SQLi) and more recently for
XSS. [1]
On 03/26/2011 01:12 PM, Gunnar Peterson wrote:
> Advanced = goes through firewall
> Persistent = tried more than once
> Threat = people trying to get into valuable stuff
>
> Nothing new to sc-l readers, but a Reasonably good marketing term esp by
> infosec standards (yay we get to scare business
Excellent response, Ivan. Malware is a business, not a programming mistake,
which Gary's article mentions then sidesteps.
This is the "Secure Coding" list so I can understand the myopia.
As for "Long Term Solutions and Wishful Thinking" in the article:
It is clear that current solutions are not
A positive side effect of many vendors being US-based is that the US market
takes most of the buzzword marketing hit. :)
On a more serious note, I think there really are APTs out there, state-driven
and all. The problem is when organizations use the term to get away with
sub-standard security o
Advanced = goes through firewall
Persistent = tried more than once
Threat = people trying to get into valuable stuff
Nothing new to sc-l readers, but a Reasonably good marketing term esp by
infosec standards (yay we get to scare business people with something other
than an auditor's clipboard!);
Agreed.
Now all you need to do is convince the people who need to solve the
problem that you have a pointer for them to use without a label?? The
market (probably because of the marketing types) is discussing and wanting
solutions for "the APT problem." To see how embedded this language is in
t
Heya Gary (all)
On Sat, Mar 26, 2011 at 3:32 PM, Gary McGraw wrote:
> I agree that the APT term is overused by the marketing types. In this
> case you can translate it as malware that infects a server or an ad
> network and is "served up" to unwitting victims in a drive by download.>
Malware di
hi mh,
I agree that the APT term is overused by the marketing types. In this
case you can translate it as malware that infects a server or an ad
network and is "served up" to unwitting victims in a drive by download.
Neil, anything to add?
What would you call it haroon?
gem
On 3/26/11 8:14 AM,
Hi
On Wed, Mar 23, 2011 at 5:14 PM, Gary McGraw wrote:
> Dasient protects the server side of the APT problem
> (especially when it comes to bad ads)
Arguing over semantics and loosely defined terms is a recipe for a
circular flame-thread, but this statement seems wrong on many levels.
I know e
On 3/22/11 12:41 PM, Gary McGraw wrote:
> hi sc-l,
>
> The tie between malware (think zeus and stuxnet) and broken software
> of the sort we work hard on fixing is difficult for some parts of the
> market to fathom. I think it's simple: software riddled with bugs
> and flaws leads directly to the
On Wed, Mar 23, 2011 at 8:14 AM, Gary McGraw wrote:
>
> I agree that clueless users who click on whatever pops up lead to many
> infections even when software is is reasonable shape, but I don't see that
> as a reason not to build better software. Presumably, you guys at paypal
> agree. Right?
On 2011-03-23 00:57, Andy Steingruebl wrote:
On Tue, Mar 22, 2011 at 8:41 AM, Gary McGraw wrote:
[...]
malware" as the AT&T guys sometimes think…you use it to find the kinds of bugs
that malware exploits to get a toehold on target servers. One level removed, but a
clear causal effect.
Inte
hi andy,
If you read the article again, I think you'll find that the solutions
offered by both Invincea and Dasient work regardless of whether the
malware is installed through broken software or through social
engineering. Dasient protects the server side of the APT problem
(especially when it com
On Tue, Mar 22, 2011 at 8:41 AM, Gary McGraw wrote:
> hi sc-l,
>
> The tie between malware (think zeus and stuxnet) and broken software of the
> sort we work hard on fixing is difficult for some parts of the market to
> fathom. I think it's simple: software riddled with bugs and flaws leads
>
hi sc-l,
The tie between malware (think zeus and stuxnet) and broken software of the
sort we work hard on fixing is difficult for some parts of the market to
fathom. I think it's simple: software riddled with bugs and flaws leads
directly to the malware problem. No, you don't use static anal
17 matches
Mail list logo