Aaron Hulett's long-time friends will particularly appreciate this acknowledgment in the paper:
Nice work, Aaron!
This paper is a "must read" to obtain a better understand monitoring software and available now from the Microsoft Download Center:
"The act of capturing keystrokes on a computer as well as other forms of monitoring can manifest in a range of ways from completely benign to overtly criminal. In cases where the logged party is unaware of the activity there is also the possibility of financial impact through various types of fraud as well as personal endangerment when the monitoring is a component of stalking or domestic violence. However, monitoring also has legitimate commercial uses such as consensual workplace monitoring, parental controls and computer troubleshooting."Another paper available from the Virus Bulletin conference is Matt Braverman's "Behavioral Modeling of Social Engineering-Based Malicious Software" which
". . . focuses on malware that leverages social engineering to infect a computer, where social engineering is defined as ‘a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures’. It will review techniques used both in the past and present and will use up-to-date data (as of the writing of this report) from the MSRT to differentiate those social engineering techniques which have been particularly successful."
News from the Microsoft Antimalware Team is available at the team blog.
No comments:
Post a Comment