Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Sandboxing Explained As Tool To Fight Flame

GFI Software : 15 June, 2012  (Technical Article)
GFI Software presents webinar on how to use sandboxing techniques as part of a defence strategy agains the Flame malware
Sandboxing Explained As Tool To Fight Flame
GFI Software will host a webinar to demonstrate how properly deployed sandbox technology would have assisted enterprise cyber-security professionals in defending their networks from Flame, the recently discovered malware also known as Flamer, sKyWIper and Skywiper. GFI Software will host the free webinar, Analysing Flame, for enterprise cyber-security professionals on 19 June at 7pm BST.

Using GFI SandBox – one of the industry’s leading malware analysis solutions – the GFI Software Flame Taskforce has identified malware behaviour exhibited by Flame not yet reported by other security vendors or malware researchers. In less than 5 minutes, GFI Software was able to use GFI SandBox to generate more than 100 MB of data, which would provide GFI SandBox users with a rich and detailed analysis of exactly how Flame executes within an infected network.

“We will demonstrate how GFI SandBox customers would have been able to identify the malicious behaviour of Flame, which ideally illustrates how sandbox technology enables enterprises to detect undiscovered, highly sophisticated malware threats that evade traditional antivirus detection,” said Julian Waits, vice president of GFI Software’s Advanced Technology Group. “Armed with this information, enterprise cyber-security professionals know with certainty if their networks are being targeted or have already been compromised, enabling them to begin isolating and remediating the threat using all the security solutions at their disposal.”

The webinar will focus on several key malware behaviour traits that would have alerted GFI SandBox users that Flame was malicious, providing them with invaluable intelligence to immediately combat this threat and mitigate any damage it could cause. The team will discuss:

* Processes monitored during analysis
* The order in which Flame creates files
* How Flame evades detection
* Flame’s unique registry activity
* How Flame drivers are installed
* Additional insight into Mutex activity already reported
* How Flame hijacks and controls Microsoft Internet Explorer
* The network traffic generated by Flame
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo