Monday, May 11, 2009

Recommended Reading - "Follow the Bouncing Malware" –Tom Liston

A new entry in the "Follow the Bouncing Malware" series has been posted to the Internet Storm Center by Tom Liston. I’ve read many of his articles over the years and find them to be very educational as well as humorous. Some of these are long but are well worth your time. They provide a good insight into how complex malicious software can be. They also show what we are up against in our battle to provide a secure environment. Bellow is a list to other articles in the series. If you find any I’m missing let me know and I will update this post.

7/23/2004

Follow the Bouncing Malware - Part I

8/23/2004

Follow the Bouncing Malware - Part II

11/4/2004

Follow The Bouncing Malware - Part III

11/24/2004

Follow The Bouncing Malware - Part IV

5/11/2005

Follow the Bouncing Malware: A Fresh Bounce

7/13/2005

Follow the Bouncing Malware - Part VI: Hypnotized and EULAgized

7/20/2005

Follow the Bouncing Malware - Part VII: Afterglow

8/22/2005

Follow the Bouncing Malware - Part VIII: All That Glitters Is Not Gold

9/22/2005

Follow the Bouncing Malware - Part IX: eGOLDFINGER

4/23/2007

Follow the Bouncing Malware: Day of the Jackal

10/9/2007

Follow the Bouncing Malware: Columbus Day

5/6/2009

Follow The Bouncing Malware: Gone With the WINS

Thanks to Tom and all the other ISC handlers for all their hard work.

Internet Storm Center Infocon Status

1 comment:

  1. Follow the Bouncing Malware: Gone With the WINS - Part II
    http://isc.sans.org/diary.html?storyid=6412

    ReplyDelete