Research Paper:

Cybercrime Tactics and Techniques 2016 Wrap-Up

12/16
2:30pm PST
Add to Calendar
12/16
2:30pm PST
Add to Calendar

What Will I Learn?

EXAMPLE #1 OF INFORMATION

Lorem ipsum sit dolor amet con siquit epidor anomaly cheese brain situation gtl omega fatty acid.

EXAMPLE #2 OF INFORMATION

Lorem ipsum sit dolor amet con siquit epidor anomaly cheese brain situation gtl omega fatty acid.

EXAMPLE #3 OF INFORMATION

Lorem ipsum sit dolor amet con siquit epidor anomaly cheese brain situation gtl omega fatty acid.

EXAMPLE #4 OF INFORMATION

Lorem ipsum sit dolor amet con siquit epidor anomaly cheese brain situation gtl omega fatty acid.

Overview:

In our first wrap-up of the threat landscape, we are going to cover the trends observed during the last few months of 2016, provide an analyst’s view of the threats, and offer some predictions for the beginning of 2017. Moving forward, every quarter we will bring you a view of the threat landscape through the eyes of Malwarebytes researchers and analysts.

Highlights:

  • Ransomware continued to grab headlines as the favorite attack methodology
  • Mac experienced its first threat of ransomware and a slew of different Trojan droppers
  • Malicious spam/phishing attacks became more sophisticated with new delivery types of payloads and more

Presenters

Speaker Name

Speaker Title

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Speaker Name

Speaker Title

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Speaker Name

Speaker Title

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Speaker Name

Speaker Title

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Where
Booth #2201

Convention Center Hall
San Luis Obispo, CA


See a floor map
Register
Agenda
2:00-2:15 Introductions
2:15-2:45 Malware overview and ransomware intro
2:45-3:00 Q&A

Speaker Name

Speaker Title

Speaker Name

Speaker Title

Speaker Name

Speaker Title

Speaker Name

Speaker Title

DON’T MISS OUT ON THIS INFORMATIONAL WEBINAR

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Sign Up Today

Register