Google Search

Sunday, May 27, 2012

SSCC 90 - A walk around Interop 2012 with John Shier

function utmx_section(){}function utmx(){}(function(){var k='1796953241',d=document,l=d.location,c=d.cookie;function f(n){if(c){var i=c.indexOf(n+'=');if(i>-1){var j=c.indexOf(';',i);return escape(c.substring(i+n.length+1,j')})();SSCC 90 – A walk around Interop 2012 with John Shier | Naked Security Antivirus and Security Software from SophosMalwareData lossSocial networksMobileApplePrivacyVulnerabilityMore...Search for: Technical paper - Fake anti-virus: The journey from Trojan to a persistent threatBritish hacker jailed for one year for breaking into Facebook account SSCC 90 - A walk around Interop 2012 with John Shier

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats.

Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats.

Don't forget you can subscribe to the SophosLabs YouTube channel to find all our latest videos.

Hi there! If you're new here, you might want to subscribe to our RSS feed for updates.

Already using Google+? Follow Naked Security's Graham Cluley for the latest security news.

On LinkedIn? Join the Naked Security discussion group and connect with your peers in the security industry.

Sorry, something happened and we couldn't sign you up. Please come back later and try again.

Congratulations, you've successfully signed up for our daily news! Check your inbox soon, we've sent you an email.

Sorry, that email doesn't look right to us so we haven't added it to our list.

We're adding your address to our list...

Join thousands of others, and sign up for Naked Security's newsletter

by Chester Wisniewski on May 17, 2012|166602Leave a commenthttp%3A%2F%2Fnakedsecurity.sophos.com%2F2012%2F05%2F17%2Fsscc-90-a-walk-around-interop-2012-with-john-shier%2FSSCC+90+-+A+walk+around+Interop+2012+with+John+Shier2012-05-17+09%3A01%3A53Chester+Wisniewskihttp%3A%2F%2Fnakedsecurity.sophos.com%2F%3Fp%3D166602

Filed Under: Podcast

Sophos Security Chet ChatFor the second episode in a row the Chet Chat comes to live from a trade show. This week John Shier joined me for a walk around at Interop 2012 in Las Vegas.

Interop is a great networking show and as always the Sophos staff worked *very* hard, but we had our fair share of play as well.

Near the end of the conference John and I thought it would be fun to wonder around a bit, pick up some swag and see if there was any sort of over-arching theme to the conference.

Cloud table

The theme? Cloud.

While RSA, InfoSec Europe and other conferences focused on security are still discussing the cloud, Interop was utterly dominated by cloud vendors. Above you can see Avaya actually brought a cloud table with network gear embedded "in the cloud".

Certificate provider Comodo had a stand in the security area near Sophos this year.

All quiet on the Comodo booth

Strangely Comodo's booth appeared largely abandoned on Thursday which doesn't leave you with a good feeling about their dedication to protecting our online identities.

Many old-school vendors like Hewlett Packard and Cisco took their best shot at remaking their brands into the coolest cloud company (C3) at Interop as well, but at Sophos we resisted the temptation and stuck with our core value: Complete Security.

(May 10 2012, duration 6:07 minutes, size 3.5 MBytes)

You can also download this podcast directly in MP3 format: Sophos Security Chet Chat 90, subscribe on iTunes or our RSS feed. You can see all of the Sophos Podcasts by visiting our archive.

Follow @chetwisniewski

Tags: chet chat, cloud, Interop, Podcast

Technical paper - Fake anti-virus: The journey from Trojan to a persistent threatBritish hacker jailed for one year for breaking into Facebook account var OB_langJS = 'http://widgets.outbrain.com/lang_en.js';var OBITm = '1327683338569';var OB_raterMode = 'none';var OB_recMode = 'strip';var OutbrainPermaLink = 'http://nakedsecurity.sophos.com/2012/05/17/sscc-90-a-walk-around-interop-2012-with-john-shier/';if ( typeof(OB_Script) != 'undefined' ) OutbrainStart(); else { var OB_Script = true; var str = unescape("%3Cscript src=\'http://widgets.outbrain.com/OutbrainRater.js\' type=\'text/javascript\'%3E%3C/script%3E"); document.write(str); }Leave a Reply Cancel replyYour email address will not be published. Required fields are marked *

Name *

Email *

Website

Comment

You may use these HTML tags and attributes:
       

About the authorChester Wisniewski is a Senior Security Advisor at Sophos Canada. He provides advice and insight into the latest threats for security and IT professionals with the goal of providing clear guidance on complex topics.You can follow Chester on Twitter as @chetwisniewski or send him an email at chesterw@sophos.com.View all posts by Chester Wisniewski

Fake anti-virus technical paper

PopularRecentRelatedWant to see who has viewed your Facebook profile? Take care..Want to see who has viewed your Facebook profile? Take care..Facebook Profile Viewer rogue application spreads on social networkFacebook Profile Viewer rogue application spreads on social networkOops! Selena and Bieber's hidden camera bedroom video Facebook scamOops! Selena and Bieber's hidden camera bedroom video Facebook scamState of Utah outlines mistakes made allowing theft of 780K recordsState of Utah outlines mistakes made allowing theft of 780K recordsRihanna sex video trap used by Facebook scammers.. againRihanna sex video trap used by Facebook scammers.. againOMG - I just hate Rihanna video Facebook scam spreadingOMG - I just hate Rihanna video Facebook scam spreadingCan you see who viewed your profile on Facebook?Can you see who viewed your Facebook profile? Scammers would like you to think sogadgets250Should jailbreaking gaming consoles, mobile phones and tablets be legalized?Backups are good - but don't forget to check your backups work [VIDEO]Backups are good - but don't forget to check your backups work [VIDEO]FBFeat175Has Facebook got your mobile number? Now your friends do tooState of Utah outlines mistakes made allowing theft of 780K recordsState of Utah outlines mistakes made allowing theft of 780K recordsgadgets250Should jailbreaking gaming consoles, mobile phones and tablets be legalized?internet-dating-woman-thumbCyber romance scams cost US victims $50 million in 2011 Backups are good - but don't forget to check your backups work [VIDEO]Backups are good - but don't forget to check your backups work [VIDEO]Call of Duty Trojan horse creator ends up in jail, after drunken college raidCall of Duty Trojan horse creator ends up in jail, after drunken college raidBritish hacker jailed for one year for breaking into Facebook accountBritish hacker jailed for one year for breaking into Facebook accountSSCC 90 - A walk around Interop 2012 with John ShierSSCC 90 - A walk around Interop 2012 with John ShierTechnical paper - Fake anti-virus: The journey from Trojan to a persistent threatTechnical paper - Fake anti-virus: The journey from Trojan to a persistent threatandroid_mobileFree Sophos Anti-Virus app for your Android Fake anti-virus disguises used by Android malwareFake anti-virus disguises used by Android malwareSSCC 86 - on-line elections, SSCC 86 - online elections, "total internet disconnection", Facebook/privacy and PII for just 3cmccarthy-250RIP John McCarthy, the LISP creator who sorted out memory mismanagementold-drives-thumb11% of second hand hard drives contain personal information, study revealsSSCC 85 - FFA, Carberp arrests, RDP vulnerability and first HITECH fineSSCC 85 - FAA, Carberp arrests, RDP vulnerability and first HITECH finethumb-aprNew monthly roundup – "90 Second News"Sophos Security Chet Chats 27 & 28 and Sept 90 Second NewsSophos Security Chet Chats 27 & 28 and Sept 90 Second Newsthumb-mayMay roundup – "90 Second News"Sophos Security Chet ChatSSCC 84.33 - RSA first impressionsSophos Security Chet ChatSSCC 81 - NCSA and Data Privacy DayVideo posts

More videos this way

36 websites selling credit card details shut down [VIDEO]36 websites selling credit card details shut down [VIDEO]VIDEO: How to solve the RSA 2012 #sophospuzzleVIDEO: How to solve the RSA 2012 #sophospuzzleAndroid malware spread via Facebook [VIDEO]Android malware spreads via Facebook [VIDEO]Viruses and hacking, as seen on TV and in the moviesViruses and hacking, as seen on TV and in the moviesdragon-video-250VIDEO: How to solve the #dragontattoo #sophospuzzleTwitter Feedgcluley: State of Utah outlines mistakes made allowing theft of 780K records http://t.co/5cXDo5FQabout 18 hours agoChetWisniewski: State of Utah admits to using default passwords, no audits and no encryption in loss of 780,000 records http://t.co/XUjzlNPBabout 20 hours agoChetWisniewski: RT @mvarmazis: My new Triforce earrings. http://t.co/Le2g0mvs <- Cool!about 20 hours ago
About Naked SecurityAbout SophosOur AuthorsAwardsGot a story for us?TagsAdobeAndroidanonymousAppleBankingClu-blogCybercrimedata lossDDoSdenial of serviceEncryptionExploitFacebookFake anti-virusFirefoxGeneralGooglehackHackerhackingHoaxiPhoneITLulzSecMac OS XMalwareMicrosoftpasswordphishingPodcastPrivacyrogue applicationSafety onlineScamscarewareSecurityShameless plugSpamSurvey ScamTwitterVideovulnerabilitywebweb 2.0WWWCategoriesApple (376)Data loss (809)Featured (701)Law & order (767)Malware (2069)Mobile (299)Podcast (144)Privacy (721)Social networks (956)SophosLabs (1372)Spam (1415)Uncategorized (51)Video (254)Vulnerability (752)Archives by monthMay 2012 (62)April 2012 (79)March 2012 (98)February 2012 (103)January 2012 (89)December 2011 (72)November 2011 (96)October 2011 (103)September 2011 (105)August 2011 (117)July 2011 (104)June 2011 (116)May 2011 (87)April 2011 (78)

More...

Download some free toolsFree anti-virus for your MacFree antivirus that works simply and beautifully Free file encryptionQuick and easy encryption for all your dataMore free tools...Take a look at our productsEndpointEncryption MobileNetworkEmailWeb

Try out our free trials and demos

Investigate the threatsVirus and spyware analysesThreat CenterInside SophosLabs © 1997-2012 Sophos Ltd. All rights reservedLegalPrivacy var OBCTm='1328889400668';utmx_section("Test trigger")jQuery(document).ready(function($){ Gravatar.profile_cb = function( h, d ) { WPGroHo.syncProfileData( h, d );}; Gravatar.my_hash = WPGroHo.my_hash; Gravatar.init( 'body', '#wp-admin-bar-my-account' ); });.reblog-from img { margin: 0 10px 0 0; vertical-align: middle; padding: 0; border: 0; }.reblogger-note img.avatar { float: left; padding: 0; border: 0; }.reblogger-note-content { margin: 0 0 20px 35px; }.reblog-post { border-left: 3px solid #eee; padding-left: 15px; }.reblog-post ul.thumb-list { display: block; list-style: none; margin: 2px 0; padding: 0; clear: both; }.reblog-post ul.thumb-list li { display: inline; margin: 0; padding: 0 1px; border: 0; }.reblog-post ul.thumb-list li a { margin: 0; padding: 0; border: 0; }.reblog-post ul.thumb-list li img { margin: 0; padding: 0; border: 0; }.reblog-post { border-left: 3px solid #eee; padding-left: 15px; }.reblog-post .wpcom-enhanced-excerpt { clear: both; }.reblog-post .wpcom-enhanced-excerpt address,.reblog-post .wpcom-enhanced-excerpt li,.reblog-post .wpcom-enhanced-excerpt h1,.reblog-post .wpcom-enhanced-excerpt h2,.reblog-post .wpcom-enhanced-excerpt h3,.reblog-post .wpcom-enhanced-excerpt h4,.reblog-post .wpcom-enhanced-excerpt h5,.reblog-post .wpcom-enhanced-excerpt h6,.reblog-post .wpcom-enhanced-excerpt p { font-size: 100% !important; }.reblog-post .wpcom-enhanced-excerpt blockquote,.reblog-post .wpcom-enhanced-excerpt pre,.reblog-post .wpcom-enhanced-excerpt code,.reblog-post .wpcom-enhanced-excerpt q { font-size: 98% !important; }

View the original article here