Artwork

Content provided by Black Hat and Jeff Moss. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Black Hat and Jeff Moss or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Saumil Shah and Dave Cole: Adware/Spyware (English)

1:19:31
 
Share
 

Manage episode 153983879 series 1109073
Content provided by Black Hat and Jeff Moss. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Black Hat and Jeff Moss or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
"The Business * Timeline?how did we get into this mess? * The players * How their business works * Legislative environment The Technology * Technical overview of different types of programs (taxonomy) * Describe how the programs function * How adware/spyware is installed * Hijacking the system * How it updates itself * Proven techniques to prevent & remove Looking ahead * Market polarization, bad get worse, good get better (more white, less grey) * Order from chaos * Installations: Beyond the website * Growing sophistication * Exploiting Adware Saumil Udayan Shah, Founder and CEO, Net-Square Solutions Pvt. Ltd. Saumil continues to lead the efforts in e-commerce security research and product development at Net-Square. His focus is on researching vulnerabilities with various e-commerce and web based application systems, system architecture for Net-Square's tools and products, and developing short term training programmes. Saumil also provides information security consulting services to Net-Square clients, specializing in ethical hacking and security architecture. He holds a designation of Certified Information Systems Security Professional. Saumil has had more than ten years experience with system administration, network architecture, integrating heterogenous platforms, and information security and has perfomed numerous ethical hacking exercises for many significant companies in the IT area. Saumil is a regular speaker and trainer at security conferences such as BlackHat, RSA, etc. Previously, Saumil was the Director of Indian operations for Foundstone Inc, where he was instrumental in developing their web application security assessment methodology, the web assessment component of FoundScan - Foundstone's Managed Security Services software and was instrumental in pioneering Foundstone's Ultimate Web Hacking training class. Prior to joining Foundstone, Saumil was a senior consultant with Ernst & Young, where he was responsible for the company's ethical hacking and security architecture solutions. Saumil has also worked at the Indian Institute of Management, Ahmedabad, as a research assistant and is currently a visiting faculty member there. Saumil graduated from Purdue University with a master's degree in computer science and a strong research background in operating systems, networking, infomation security, and cryptography. At Purdue, he was a research assistant in the COAST (Computer Operations, Audit and Security Technology) laboratory. He got his undergraduate degree in computer engineering from Gujarat University, India. Saumil is a co-author of "Web Hacking: Attacks and Defense"(Addison Wesley, 2002) and is the author of "The Anti-Virus Book"(Tata McGraw-Hill, 1996) David Cole, Director, Symantec Dave Cole serves as director of product management for Symantec Security Response. Cole is responsible for the overall strategy and management of Symantec Security Response research and services. In this position, Cole also leads the execution of delivering timely and critical security content to Symantec customers and partners worldwide. Symantec Security Response, part of Symantec Global Services & Support, is a team of dedicated intrusion experts, security engineers, virus hunters, threat analysts, and global technical support teams that work in tandem to provide extensive coverage for enterprise businesses and consumers. Cole?s 10 years of information security experience includes a wide variety of information security services, including security architecture design, legislative compliance, penetration testing, and incident response. As a recognized pioneer of vulnerability management, Cole has led the design and development of an award-winning vulnerability management system. Cole?s background includes working with Fortune 500 organizations and Federal government agencies, and he is currently a leading spokesperson for Symantec on spyware and adware topics. Prior to working at Symantec, Cole held numerous senior positions within market leading organizations such as Deloitte & Touche and security technology companies. Cole?s design work on security metrics, reporting, and remediation technology has been submitted for U.S. patents. Cole has served as an authoritative speaker at a number of industry events and for the media. Cole is a contributing author of Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle and has been a featured author in publications such as Government Security News. Cole graduated Magna Cum Laude from the University of Michigan Business School where he obtained his bachelor's of business administration in computer & information systems. Cole is a certified information systems security professional (CISSP). Return to the top of the page"
  continue reading

14 episodes

Artwork
iconShare
 
Manage episode 153983879 series 1109073
Content provided by Black Hat and Jeff Moss. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Black Hat and Jeff Moss or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
"The Business * Timeline?how did we get into this mess? * The players * How their business works * Legislative environment The Technology * Technical overview of different types of programs (taxonomy) * Describe how the programs function * How adware/spyware is installed * Hijacking the system * How it updates itself * Proven techniques to prevent & remove Looking ahead * Market polarization, bad get worse, good get better (more white, less grey) * Order from chaos * Installations: Beyond the website * Growing sophistication * Exploiting Adware Saumil Udayan Shah, Founder and CEO, Net-Square Solutions Pvt. Ltd. Saumil continues to lead the efforts in e-commerce security research and product development at Net-Square. His focus is on researching vulnerabilities with various e-commerce and web based application systems, system architecture for Net-Square's tools and products, and developing short term training programmes. Saumil also provides information security consulting services to Net-Square clients, specializing in ethical hacking and security architecture. He holds a designation of Certified Information Systems Security Professional. Saumil has had more than ten years experience with system administration, network architecture, integrating heterogenous platforms, and information security and has perfomed numerous ethical hacking exercises for many significant companies in the IT area. Saumil is a regular speaker and trainer at security conferences such as BlackHat, RSA, etc. Previously, Saumil was the Director of Indian operations for Foundstone Inc, where he was instrumental in developing their web application security assessment methodology, the web assessment component of FoundScan - Foundstone's Managed Security Services software and was instrumental in pioneering Foundstone's Ultimate Web Hacking training class. Prior to joining Foundstone, Saumil was a senior consultant with Ernst & Young, where he was responsible for the company's ethical hacking and security architecture solutions. Saumil has also worked at the Indian Institute of Management, Ahmedabad, as a research assistant and is currently a visiting faculty member there. Saumil graduated from Purdue University with a master's degree in computer science and a strong research background in operating systems, networking, infomation security, and cryptography. At Purdue, he was a research assistant in the COAST (Computer Operations, Audit and Security Technology) laboratory. He got his undergraduate degree in computer engineering from Gujarat University, India. Saumil is a co-author of "Web Hacking: Attacks and Defense"(Addison Wesley, 2002) and is the author of "The Anti-Virus Book"(Tata McGraw-Hill, 1996) David Cole, Director, Symantec Dave Cole serves as director of product management for Symantec Security Response. Cole is responsible for the overall strategy and management of Symantec Security Response research and services. In this position, Cole also leads the execution of delivering timely and critical security content to Symantec customers and partners worldwide. Symantec Security Response, part of Symantec Global Services & Support, is a team of dedicated intrusion experts, security engineers, virus hunters, threat analysts, and global technical support teams that work in tandem to provide extensive coverage for enterprise businesses and consumers. Cole?s 10 years of information security experience includes a wide variety of information security services, including security architecture design, legislative compliance, penetration testing, and incident response. As a recognized pioneer of vulnerability management, Cole has led the design and development of an award-winning vulnerability management system. Cole?s background includes working with Fortune 500 organizations and Federal government agencies, and he is currently a leading spokesperson for Symantec on spyware and adware topics. Prior to working at Symantec, Cole held numerous senior positions within market leading organizations such as Deloitte & Touche and security technology companies. Cole?s design work on security metrics, reporting, and remediation technology has been submitted for U.S. patents. Cole has served as an authoritative speaker at a number of industry events and for the media. Cole is a contributing author of Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle and has been a featured author in publications such as Government Security News. Cole graduated Magna Cum Laude from the University of Michigan Business School where he obtained his bachelor's of business administration in computer & information systems. Cole is a certified information systems security professional (CISSP). Return to the top of the page"
  continue reading

14 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide