Category: Trojan Horse

  • Executive Order on Improving Critical Infrastructure Cybersecurity

    President Obama highlighted the need for cybersecurity in his 2013 State of the Union Address:

    America must also face the rapidly growing threat from cyber attacks.

    Now, we know hackers steal people’s identities and infiltrate private e-mails. We know foreign countries and companies swipe our corporate secrets. Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, our air traffic control systems.

    We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy. That’s why, earlier today, I signed a new executive order that will strengthen our cyber defenses by increasing information-sharing and developing standards to protect our national security, our jobs, and our privacy.

    But now — now Congress must act, as well, by passing legislation to give our government a greater capacity to secure our networks and deter attacks. This is something we should be able to get done on a bipartisan basis.

    The same day he issued an executive order aimed at information sharing with private industry to improve the cybersecurity of our national critical infrastructure systems.

     

  • Interview with From End to Edge

    Check out how I came up with the titles to my novels and my view on cloud security in this From End to Edge interview with Yuri Duiogenes and Tom Shinder:

    ToTheEdge

  • Chinese Hackers Breach NY Times

    In a story that reads like it came strait out of Trojan Horse, the NY Times announced today that it has been infiltrated by Chinese hackers in a campaign that ran over the last several months since the Times readied a story on a the corruption of a Chinese official:

    Hackers in China Attacked The Times for Last 4 Months

     

  • My Sessions at RSA Conference US 2013

    I’m excited to announce that I’m delivering two sessions at the prestigious RSA Conference on cybersecurity, which takes place in San Francisco from February 25 to March 1. One is Malware Hunting with the Sysinternals Tools, where I teach you how to use several of my popular Sysinternals utilities, including Process Explorer, Process Monitor and Autoruns, to diagnose and clean malware infections. The theme of my second talk, Trojan Horse: The Widespread Use of International Cyber-Espionage as a Weapon, is obviously aligned with that of my novel Trojan Horse.

    Here are the session abstracts and times and below them a link to the conference’s full session list.

    HTA-R32 – Malware Hunting with the Sysinternals Tools 
    Thursday, February 28 09:20 AM – 10:20 AM
    This session will provide an overview of several Sysinternals tools, including Process Monitor, Process Explorer and Autoruns, focusing on features useful for malware analysis and removal. We will demonstrate malware-hunting capabilities by presenting several real-world cases that used the tools to identify and clean malware, and conclude by performing a live analysis of current malware samples.

    EXP-R35 – Trojan Horse: The Widespread Use of International Cyber-Espionage as a Weapon
    Thursday, February 28 01:00 PM – 2:00 PM
    Learn how governments including the U.S., Russia, China and Iran, use cyberspace as a theater of cyber warfare and espionage. Understand the trends and where escalation may lead.

    RSA Conference full session list.

     

  • Take the Operation Desolation Cybersecurity Quiz and Win!

    Jeff Aiken authors a cybersecurity quiz in my short story Operation Desolation (available for only 99 cents). Now you can take the quiz to test your cybersecurity knowledge and if you do so by November 11 you’re entered into a drawing of signed copies of all all my books.

    The Operation Desolation Cybersecurity Quiz

  • Enter to Win a Signed Copy of Trojan Horse

    Email me a receipt at mark@russinovich.com verifying your purchase of my $0.99 short story, Operation Desolation, by August 22 and you could win a signed copy of my new novel Trojan Horse before it’s publicly available for purchase on September 4.