Podcast
Questions and Answers
What makes a zero day attack particularly appealing to attackers?
What makes a zero day attack particularly appealing to attackers?
What role do drivers play in a potential malware attack on a computer system?
What role do drivers play in a potential malware attack on a computer system?
Why are attackers interested in finding new attack types for infecting computers?
Why are attackers interested in finding new attack types for infecting computers?
What makes the audio drivers on Hewlett-Packard systems vulnerable to malware attacks in May 2016?
What makes the audio drivers on Hewlett-Packard systems vulnerable to malware attacks in May 2016?
Signup and view all the answers
What characteristic of new attack types makes them challenging for antivirus software to detect?
What characteristic of new attack types makes them challenging for antivirus software to detect?
Signup and view all the answers
How do most antivirus and anti-malware software function in preventing known vulnerabilities?
How do most antivirus and anti-malware software function in preventing known vulnerabilities?
Signup and view all the answers
What feature was included in the audio control software discussed?
What feature was included in the audio control software discussed?
Signup and view all the answers
What is the purpose of a shim in the context of the text?
What is the purpose of a shim in the context of the text?
Signup and view all the answers
How can malware authors take advantage of the Windows compatibility mode?
How can malware authors take advantage of the Windows compatibility mode?
Signup and view all the answers
What is a key logger used for in the context of the text?
What is a key logger used for in the context of the text?
Signup and view all the answers
What is the purpose of using refactoring in malware creation?
What is the purpose of using refactoring in malware creation?
Signup and view all the answers
How does a shim relate to putting malware onto a computer?
How does a shim relate to putting malware onto a computer?
Signup and view all the answers
What technique does metamorphic malware use to avoid detection by antivirus software?
What technique does metamorphic malware use to avoid detection by antivirus software?
Signup and view all the answers
How can an attacker use the key logger feature in audio control software?
How can an attacker use the key logger feature in audio control software?
Signup and view all the answers
What is the role of a shim in the Windows compatibility mode?
What is the role of a shim in the Windows compatibility mode?
Signup and view all the answers
How do shims relate to malware insertion based on the text?
How do shims relate to malware insertion based on the text?
Signup and view all the answers
What is a zero day attack?
What is a zero day attack?
Signup and view all the answers
How do attackers exploit hardware drivers in a system?
How do attackers exploit hardware drivers in a system?
Signup and view all the answers
What was the vulnerability associated with audio drivers on Hewlett-Packard systems in May 2016?
What was the vulnerability associated with audio drivers on Hewlett-Packard systems in May 2016?
Signup and view all the answers
Why are zero day attacks particularly challenging for antivirus software?
Why are zero day attacks particularly challenging for antivirus software?
Signup and view all the answers
How do attackers adapt to overcome antivirus software's ability to stop known vulnerabilities?
How do attackers adapt to overcome antivirus software's ability to stop known vulnerabilities?
Signup and view all the answers
What role do hardware drivers play in a malware attack on a computer system?
What role do hardware drivers play in a malware attack on a computer system?
Signup and view all the answers
What does a key logger included in the audio control software allow an attacker to do?
What does a key logger included in the audio control software allow an attacker to do?
Signup and view all the answers
How does refactoring help malware authors evade detection by antivirus software?
How does refactoring help malware authors evade detection by antivirus software?
Signup and view all the answers
What is the purpose of using a shim in the context of Windows compatibility mode?
What is the purpose of using a shim in the context of Windows compatibility mode?
Signup and view all the answers
How can an attacker exploit the compatibility mode feature in Windows to elevate user privileges?
How can an attacker exploit the compatibility mode feature in Windows to elevate user privileges?
Signup and view all the answers
What is the main purpose of a shim in the context of the text?
What is the main purpose of a shim in the context of the text?
Signup and view all the answers
Why do malware authors use metamorphic malware when creating malicious programs?
Why do malware authors use metamorphic malware when creating malicious programs?
Signup and view all the answers
In what way can malware authors utilize the shimmed area to infiltrate a computer system?
In what way can malware authors utilize the shimmed area to infiltrate a computer system?
Signup and view all the answers
How does a key logger in audio control software demonstrate vulnerabilities in driver security?
How does a key logger in audio control software demonstrate vulnerabilities in driver security?
Signup and view all the answers
Why is refactoring commonly used by malware authors in creating new malicious programs?
Why is refactoring commonly used by malware authors in creating new malicious programs?
Signup and view all the answers
How does using a shimmed area allow malware authors to circumvent security features in Windows systems?
How does using a shimmed area allow malware authors to circumvent security features in Windows systems?
Signup and view all the answers