COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Security Seminar > Dmitry goes to Hollywood: Criminal Excellence in (Cyber) La La Land
Dmitry goes to Hollywood: Criminal Excellence in (Cyber) La La LandAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Jack Hughes. Cyber-criminals and attackers at large have access to a wide range of technologies and techniques of varying sophistication to deliver attacks: from script-kiddie types of attacks employing automated and well-known exploits, to mature malware delivery platforms capable of crypting or packing malware at delivery time, and multi-stage, highly tailored social engineering attacks employing a large portfolio of targeting and psychological techniques. Yet, most cyber-criminal ventures are relatively un-interesting: dozens of underground market places exists, but which of those support technological innovation rather than mainly scam-for-scammers activities is currently hard to know. Similarly, yet another “Your mailbox is full, please click here to reset your password” phishing attack hardly makes the news, while we lack the tools to characterize much more sophisticated and innovative social engineering attacks targeting, for example, specific individuals across multiple attack stages. In this talk we discuss what features characterize “cyber-criminal excellence”, and distinguish it from “ordinary” Internet crime. Reflecting current attack trends, we focus on criminal markets and social engineering techniques: within both domains, we propose and discuss models and criteria to characterize relevant and highly innovative criminal ventures and sophisticated social engineering attacks which ought to be studied and understood, and showcase their application through real-world case studies. RECORDING : Please note, this event will be recorded and will be available after the event for an indeterminate period under a CC BY -NC-ND license. Audience members should bear this in mind before joining the webinar or asking questions. This talk is part of the Computer Laboratory Security Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsCommission based business in india TemplatesGuider SeminarsOther talksThe use of psychedelics in ancient Asia and Greece 'Direct Optical Nanoscopy with Axially Localized Detection' Ice cores and interglacials Understanding galactic morphology using cosmological simulations with controlled initial conditions Cambridge Journal of Economics 2021 Conference Constraining Variational Inference with Geometric Jensen-Shannon Divergence |