There are a notable number of conferences each year that one attends in this business. I am lucky enough to have been a participant and speaker at… Read more “BLACK HAT and DEFCON (the belated draft posted unfinished)”
Tag: malware
A Hemispheric Messaging Convention–and what the heck does that mean anyway?
I appeared on a panel at a recent ICANN conference, together with my old pals the APWG. We had been fighting the good fight for some years… Read more “A Hemispheric Messaging Convention–and what the heck does that mean anyway?”
Why is mobile different from previous computing systems?
Attacks tend to find the common denominator. What is the most common shared resource between the most devices under attack. For a long time this has been… Read more “Why is mobile different from previous computing systems?”
WHO ARE THE BAD GUYS?
A basic taxonomy of cyber-actors By David Perry In the beginning, there were hackers. They sat alone, playing online games, hanging out in BBS systems closed to… Read more “WHO ARE THE BAD GUYS?”
The Target Malware found (a followup repost from WIRED)
Image: Juanmonino/Getty The malicious program used to compromise Target and other companies was part of a widespread operation using a Trojan tool known as Trojan.POSRAM, according to… Read more “The Target Malware found (a followup repost from WIRED)”
Target Breach!
This weekend I was interviewed by ABC news about the Target and Neiman Marcus breaches. You can see the video here. As usual, there is a lot… Read more “Target Breach!”
Mister Perry goes to Red Square

This is me speaking at Infosec Moscow in 2008, and pointing to my name on a Cyrillic program board.
The Y2K antivirus Crew

This is myself, Jimmy (Chengi) Kuo, Commander John McCarthy (retired) and Stephen Trilling. Although the photo commemorates us all working together at the y2k rollover in DC, it was taken at the 2003 President’s Initiative to Secure Cyberspace at Stanford University.