Home > Daily Thoughts > VB2009


I should have posted this content here as well.

So, the presentation has a different twist on what I have wrote in the whitepaper. I started building the understanding about Mac security in my introduction, as I lead the context to analysis at the specific threat families. Then followed by taking the macro analysis by broadening the perspective into attackers’ underlying business models, the competitive advantages it brings while constructing the means, motive and how these aspects build and created opportunity that enables these organize group to perform and deploy threats and attacks to Mac users.

While the momentum of interest and excitement increases, my presentation suddenly froze and crash report pops-up.  Indeed, an ice breaker as I continue to deliver the remaining slides.

At the end, the presentation shared some actual infection report and showed data how successful these threat into penetrating in this platform.

It was a great experience and same time meeting fellow researchers in this conference!

  1. October 30, 2009 at 8:10 am

    Congratulations on the experience. It does get easier with practice. See you at AVAR Kyoto 2009?

  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: