Silicon Shecky

Infosec Practitioner

  • About
  • Categories
    • General
    • Computers
    • Software
    • Rants
    • Security
    • Internet/Music
    • Reviews
    • Microsoft
    • Hardware
    • Mobile Computing
  • Links
    • Infosec
      • Burbsec
      • Infosec Exchange Mastodon
      • Hacks4Pancakes Blog
      • Krebs On Security
      • Bleeping Computer
  • Archives

Connect

  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter

[footer_backtotop]

Copyright © 2025 ·Sixteen Nine Pro Theme · Genesis Framework by StudioPress · WordPress

A new way to fight Malware, Sort Of

June 6, 2011 By Michael Kavka Leave a Comment

We all know Social Engineering is the most commonly used way to spread malware. There seems to be a device that can help with that, as far as e-mails go. Its not a cheap form of protection though.

We all know that Social Engineering is the easiest way to spread malware. As P.T. Barnum said, “There’s a sucker born every minute,” and in the age of the Internet, it is even easier to get to those suckers. Pyramid Schemes, Malware, Phishing Attacks, all heavily rely on the mark being trusting. Anti-Malware, Firewalls, and security devices have always had a problem with this angle of attack.

Now a company called Cyveillance is touting a new appliance to help mitigate the Social Engineering front. Two problems though. First, like all first generation, innovative ideas, the cost is more than most people make in a year. Over $100,000 for the device alone, not including all the scan types, and extra protection licenses added on.

Second, it only scans e-mail. This is nice for those instances where it is e-mail that has a bad link, but a lot of the malware is coming through hijacked ads on websites. This device doesn’t take any of that into account.

More information is available here and here. Overall the idea of a device like this, or algorithms and heuristics that can defend on this front, and be reliable, is where we need to focus our defenses on. Hopefully, someone can go the next step on this. After all, we are only as secure as the weakest link in the chain.

Filed Under: Hardware, Security Tagged With: e-mail, Heuristics, Malware, Phishing, Social Engineering

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

RSS Taggart Institute Intel Feed

  • Ofcom fines 4chan £20K and counting for pretending UK's Online Safety Act doesn't exist October 13, 2025 Connor Jones
  • AI and the Future of American Politics October 13, 2025 Bruce Schneier
  • Dutch government puts Nexperia on a short leash over chip security fears October 13, 2025 Dan Robinson
  • Why Gradualism Can Help in Gaza October 13, 2025 Amr Hamzawy
  • The Coming AI Backlash October 13, 2025 Beatrice Magistro
  • Hacking the Nokia Beacon 1 Router: UART, Command Injection, and Password Generation with Qiling October 13, 2025
  • Earth’s Climate Has Passed Its First Irreversible Tipping Point and Entered a ‘New Reality’ October 12, 2025 Becky Ferreira
  • ISC Stormcast For Monday, October 13th, 2025 https://isc.sans.edu/podcastdetail/9652, (Sun, Oct 12th) October 12, 2025
  • Oracle Warns of E-Business Suite Bug  October 12, 2025 Lindsey O'Donnell-Welch
  • From sizzle to drizzle to fizzle: The massive data leak that wasn’t (1) October 12, 2025 Dissent

Browse by tags

Active Directory Android Antivirus Apple Beta Chrome Computers Exchange Exchange 2007 Firefox General Thoughts Google InfoSec Internet Explorer iOS iPad IT Linux Mac Malware Microsoft OS OSx Patches Rants SBS SBS 2008 Security Security Patches Server SMB Software Support Surface TechEd Tweets Ubuntu Verizon Virus Vista vulnerabilities Windows Windows 7 Windows 8 XP