I was perusing the seminar briefing website from this year’s Black Hat EU, fishing for potential article topics, when I came across a briefing note titled “DropSmack: How cloud synchronization services render your corporate firewall worthless.” Feeling a nibble, I read the briefing. Right away, I knew I hooked a keeper:
“The contributions of this presentation are threefold. First, we show how cloud-based synchronization solutions in general, and Dropbox in particular, can be used as a vector for delivering malware to an internal network.”
The other two contributions were as eye-opening:
Show how the Dropbox synchronization service can be used as a Command and Control (C2) channel.
Demonstrate how functioning malware is able to use Dropbox to smuggle out data from exploited remote computers.
2More
3More
Director Wants His Film on The Pirate Bay, Pirates Deliver... | TorrentFreak - 0 views
2More
Endless: A complete Linux computer the rest of the world can afford - 1 views
2More
Big Data is Big Business for Commerce | Economics and Statistics Administration - 0 views
9More
Should you buy enterprise applications from a startup? - 0 views
2More
YouTube flushes Flash for future flicks * The Register - 0 views
3More
Technology Changes; People Don't | Baseline [# ! Note] - 0 views
1More
Spotify, Apple, Tidal Paying $1.6 Million a DAY In Major Label Guarantees... - 0 views
2More