Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should You Really Do to Protect Against It

Webinar Registration

Wow! Flame is like a Tom Clancy / Mission Impossible story brought to life! It’s huge. In fact, the more I think about it, I’m sure we’ll see a movie on this and the plot won’t need much invention – just some good characters.
 
Anyway, the biggest thing that makes this attack so amazing is the difficult encryption attack that the attackers pulled off - and how they successfully used it to hack the public key infrastructure. Finding a collision in clear text space is no small feat.
 
In this webinar, I will walk you through what we know about flame (which is actually a lot) and help you understand the details of how it worked.
 
Even if the attack was launched by US and Israeli entities, it signals a new level of cyber threat. Other entities we are more afraid of may be further emboldened to escalate the sophistication and daring of their attacks. (I know! Plenty of you privacy folks are already afraid of entities already mentioned.)
 
After going through the fascinating nuts and bolts of Flame, we’ll take a step back and determine what lessons can be learned. And to do that, we’ll look at the entire attack which featured more than just encryption exploits. We’re talking about social engineering, removable devices and more.
 
This event is sponsored by Lumension Endpoint Security and it’s going to be awesome. Don’t miss this real training for free™!
 
First Name:   
Last Name:   
Work Email:  
Phone:  
Organization:  
Country:    
City:  
State:  
Zip/Postal Code:  
Number of Employees?:
Job Title?:
Industry?:
 

Your information will be shared with the sponsor.

By clicking "Submit", you're agreeing to our Privacy Policy and consenting to be contacted by us and the sponsor.

 

 

Additional Resources