Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

How Malware Uses and Abuses Your Software

LASCON via YouTube

Overview

Explore how malware exploits and misuses legitimate software in this 48-minute LASCON conference talk. Discover common techniques employed by malware authors to conceal their activities and evade detection. Learn about the challenges faced in forensic investigations and gain actionable insights to secure your development process. Understand the importance of creating a secure build environment, the realities of code signing, and methods for positively identifying your software. Walk away with practical strategies to protect your applications from becoming targets for malware authors and ensure third-party validation. Delve into topics such as antivirus systems, file reputation services, sandboxes, system comparisons, and the crucial role of certificates in software security.

Syllabus

Intro
Background
Typical Malware Investigation
Antivirus
File Ballot
How do you know if its good
VirusTotal
Google
File Advisor
Sandboxes
Comparing systems
HP files
Certificates
Download and Compare
How can you help
Use Trusted Third Parties
Protect Your Building Arm
Securing Your Build Environment
Protect Your Build Environment
Never Ship Infected Code

Taught by

LASCON

Reviews

Start your review of How Malware Uses and Abuses Your Software

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.