How Malware Uses and Abuses Your Software
Offered By: LASCON via YouTube
Course Description
Overview
Explore how malware exploits and misuses legitimate software in this 48-minute LASCON conference talk. Discover common techniques employed by malware authors to conceal their activities and evade detection. Learn about the challenges faced in forensic investigations and gain actionable insights to secure your development process. Understand the importance of creating a secure build environment, the realities of code signing, and methods for positively identifying your software. Walk away with practical strategies to protect your applications from becoming targets for malware authors and ensure third-party validation. Delve into topics such as antivirus systems, file reputation services, sandboxes, system comparisons, and the crucial role of certificates in software security.
Syllabus
Intro
Background
Typical Malware Investigation
Antivirus
File Ballot
How do you know if its good
VirusTotal
Google
File Advisor
Sandboxes
Comparing systems
HP files
Certificates
Download and Compare
How can you help
Use Trusted Third Parties
Protect Your Building Arm
Securing Your Build Environment
Protect Your Build Environment
Never Ship Infected Code
Taught by
LASCON
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network