{"id":915,"date":"2012-11-19T13:19:44","date_gmt":"2012-11-19T11:19:44","guid":{"rendered":"http:\/\/saisa.eu\/blogs\/Guidance\/?p=915"},"modified":"2012-11-19T16:47:43","modified_gmt":"2012-11-19T14:47:43","slug":"money-behind-the-malware-and-security-training-tools-by-sophos","status":"publish","type":"post","link":"https:\/\/saisa.eu\/blogs\/Guidance\/?p=915","title":{"rendered":"Money Behind the Malware, and security training tools by Sophos"},"content":{"rendered":"<p><a href=\"http:\/\/www.sophos.com\/en-us\/\">Sophos<\/a> can published a good information for learning more about malwares today.<\/p>\n<p>For example, the document on <a href=\"http:\/\/www.sophos.com\/en-us\/security-news-trends\/security-trends\/money-behind-malware-threats.aspx\">Exposing the Money Behind the Malware: How cybercrime works and what to do about it<\/a> (direct link to <a href=\"http:\/\/www.sophos.com\/en-us\/medialibrary\/Gated%20Assets\/white%20papers\/sophosmoneybehindmalwarewpna.pdf?id=6e74cc46-df45-47f7-a52c-ff8a441f4f66&amp;dl=true\">pdf<\/a>)<\/p>\n<ul>\n<li>It  introduces <a href=\"http:\/\/www.sophos.com\/en-us\/security-news-trends\/security-trends\/money-behind-malware-threats\/money-behind-the-malware.aspx\">concepts<\/a> like Pay-per-click fraud, Fake security software, Ransomware.<\/li>\n<\/ul>\n<p>Also, it is worth to look also the related videos on their <a href=\"http:\/\/www.sophos.com\/en-us\/Sophos\/Security%20News%20Trends\/Anatomy%20of%20an%20Attack.aspx\">Anatomy of an Attack<\/a> page (see videos column), and on other their pages:<\/p>\n<ul>\n<li>Related to Fake security software,\n<ul>\n<li>&#8220;Fake antivirus&#8221; demoe video (5 min, in <a href=\"http:\/\/www.youtube.com\/watch?v=xxDm_sKhIBM&amp;feature=player_embedded\">youtube<\/a>)<\/li>\n<li>iFrame drive-by attack demo (5 min, <a href=\"http:\/\/www.youtube.com\/watch?v=_cBed6-ufIQ&amp;feature=player_embedded\">youtube<\/a>)<\/li>\n<li>The new breed of cybercriminals (5 min, in <a href=\"http:\/\/www.youtube.com\/watch?v=MeCS1rttxhg&amp;feature=player_embedded\">youtube<\/a>)<\/li>\n<li>Server-side polymorphism demo (3 min, in <a href=\"http:\/\/www.youtube.com\/watch?v=K3TeUzPkO-o&amp;feature=relmfu\">youtube<\/a>)\n<ul>\n<li>ie. challenge for antivirus tools to detect malware<\/li>\n<li>(every time\/visit a different malware code is produced by server)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Related to Ransomware,\n<ul>\n<li><a href=\"http:\/\/nakedsecurity.sophos.com\/2012\/08\/29\/reveton-ransomware-exposed-explained-and-eliminated\/\">Reveton\/FBI ransomware &#8211; exposed, explained and eliminated<\/a> (3 min, in <a href=\"http:\/\/www.youtube.com\/watch?feature=player_embedded&amp;v=-qR3D-Jx6FQ\">youtube<\/a>)<\/li>\n<li><img loading=\"lazy\" height=\"139\" alt=\"ransomware\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2012\/11\/ransomware.jpg\" width=\"225\" \/><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>How to utilize this in a training program? What is needed in general for a training program? Well, Sophos also have general training material at their <a href=\"http:\/\/www.sophos.com\/en-us\/security-news-trends\/it-security-dos-and-donts.aspx\">IT Security Training Tools<\/a> page, which is also worth to look at.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sophos can published a good information for learning more about malwares today. For example, the document on Exposing the Money Behind the Malware: How cybercrime works and what to do about it (direct link to pdf) It introduces concepts like &hellip; <a href=\"https:\/\/saisa.eu\/blogs\/Guidance\/?p=915\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[44],"tags":[],"_links":{"self":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/915"}],"collection":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=915"}],"version-history":[{"count":1,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/915\/revisions"}],"predecessor-version":[{"id":916,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/915\/revisions\/916"}],"wp:attachment":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=915"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=915"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}