YoVDO

How Malware Uses and Abuses Your Software

Offered By: LASCON via YouTube

Tags

LASCON Courses Software Development Courses Cybersecurity Courses Malware Courses

Course Description

Overview

Explore how malware exploits and misuses legitimate software in this 48-minute LASCON conference talk. Discover common techniques employed by malware authors to conceal their activities and evade detection. Learn about the challenges faced in forensic investigations and gain actionable insights to secure your development process. Understand the importance of creating a secure build environment, the realities of code signing, and methods for positively identifying your software. Walk away with practical strategies to protect your applications from becoming targets for malware authors and ensure third-party validation. Delve into topics such as antivirus systems, file reputation services, sandboxes, system comparisons, and the crucial role of certificates in software security.

Syllabus

Intro
Background
Typical Malware Investigation
Antivirus
File Ballot
How do you know if its good
VirusTotal
Google
File Advisor
Sandboxes
Comparing systems
HP files
Certificates
Download and Compare
How can you help
Use Trusted Third Parties
Protect Your Building Arm
Securing Your Build Environment
Protect Your Build Environment
Never Ship Infected Code


Taught by

LASCON

Related Courses

Comparing WAF and RASP - Why?
LASCON via YouTube
API Security - Is it the New Application Attack Surface and How to Secure at Enterprise Scale
LASCON via YouTube
Privacy Impact Assessments - How Much Privacy Is Enough?
LASCON via YouTube
Your Frontier Defense - Understanding Web Application Firewalls
LASCON via YouTube
Doing This One Crazy Thing Will Change Your AppSec Program Forever
LASCON via YouTube