Dear Troy,
Now that we've learned who in the motion picture industry won Oscars last night and who didn't, and we resume our own
routines, relieved of the suspense, we turn our thoughts to Spring ... well, at least we dream of it! (Spring will get here, we're just certain!)
Our chapter meeting for the month of March features Dr. Richard Enbody who will discuss a few of the newest technological twists in web-based attacks and under-the-radar shenanigans, methods used to steal money. Perhaps this talk could be titled, "Sutton's
Law: Some Cyber Versions."
Our speaker's abstract:
"Willie Sutton, the bank robber, famously answered the question 'Why do you rob banks?' with 'because that's where the money is.' Today the money is on the Internet so that is where the modern day Willie Suttons are. Botnets are the primary platform
for attacks so I will describe how botnets are deployed through drive-by downloads and browser exploit packs. Then I will describe how man-in-the-browser attacks built upon hooking are
used to launch form-grabbing and web-inject routines that grab users' banking credentials (accounts, passwords, and other items). If I have time I will describe a defense, WPSeal, against those hooking attacks that a recent Ph.D. student of mine developed."
Richard Enbody is an Associate Professor in the Department of Computer Science and Engineering at Michigan State University. He joined the faculty in 1987 after earning his Ph.D. in Computer Science from the University of Minnesota. Richard received his
B.A. in Mathematics from Carleton College in Northfield, Minnesota in 1976, and spent six years teaching high school mathematics in Vermont and New Hampshire. Richard has published research in a variety of areas, but mostly in computer security and computer
architecture. He holds two nanotechnology patents, the product of collaborating with experts in the physical sciences. Together with Bill Punch he published a textbook on using Python in CS1: "The Practice of Computing Using Python" (Addison-Wesley, 2010),
now in its second edition. A second book, "Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware," will be published in April, 2014 (and is already on Amazon). When not teaching, Richard plays hockey and squash, he canoes, and he enjoys
a host of family activities.
Consider bringing a professional friend with you by sharing this message with others who may be interested!
|