• Command and Control

    I recently attended the Black Hat USA 2012 in Las Vegas. During the conference, I focused my attention on cyberespionage. This involves attackers who are on a mission with well-defined objectives. They are a source of persistent, targeted attacks. I learned a lot about command and control during my training. Command and control — also known as C&C or C2

        in Malware
    0
  • Code Signing: Best Practices

    The biggest issue with code signing is the protection of the private signing key associated with the code signing certificate. If the key gets compromised, then your certificate is worthless. A compromised key may also jeopardizethe software that you have already signed. Here are some best practices for code signing: 1. Minimize access to private keys Computers with keys should

        in Code Signing
    0
  • Self-Signed Versus Trusted CA Certificates

    In most cases you have to sign your code in order to get it installed on the operating system. You can sign your code using a self-signed certificate or using a certificate issued by a publicly-trusted CA. Due to the costs of buying a code signing certificate from a publicly-trusted CA, some users will decide to try a self-signed certificate.

        in Code Signing
    0
Page 1 of 5123...5...»»