All in Vulnerability

#16: The Grey Side of Security with Daniel Nowak - Part 2

Here is part 2 of our interview with Daniel Nowak. Daniel has spent over two decades in the trenches of the global security community. Dan has worked for everyone from fortune 500 to Startups to governments to NGOs domestically and abroad. He consults on a wide range of security challenges and strategies. Dan describes himself as a Cyber, Intel, IO, Signals / Adjunct, Coffee, Entrepreneur and Trainer. I have known Dan since 2003, and I always find him a great source on security info. Dan will also be teaching a class online at NYU this summer on cybersecurity, so don’t miss that if you are a student at NYU.

New Mac Trojan Disguised As EXE File

Trend Micro is reporting on a a Trojan that is disguised as a Windows executable. It is built with the Mono framework built into the file, so it can execute the EXE code. Normally Windows executable files will not run on a mac, so some of the built in safeguards are bypassed by this method of delivery, “This routine evades Gatekeeper because EXE is not checked by this software, bypassing the code signature check and verification since the technology only checks native Mac files.”