The Information Age may just as well be known as the age of the data breach. Malware co-developed almost simultaneously with the advent of the Information Age.
Creeper, the first known computer virus, was developed in 1971, just three years after the creation of the ARPAnet. Creeper would not look unfamiliar to a modern information security professional. It spread unchecked through the primitive internet, displaying the text “I’m the Creeper. Catch me if you can!” on affected mainframes.
- 24 Vendor Profiles and Capabilities References
- 10 Top Questions for Buyer’s
- Complete Market Overview
Shortly thereafter, a different program—Reaper—was developed. Its only purpose was to delete Creeper. It was the first antivirus software. From that playful beginning, malware detection and interception developed into its present-day arms race.
Today, endpoint protection has moved far beyond basic malware scanning—it’s now a commodity of information security. Now, as Malware evolves into targeted Advance Persistent Threats, any response has to be layered, proactive, and highly visible.
In this 47-slide presentation, InfoSec pros from Panda Security walk us through the history of malware, how it’s changed, and what we can do to fight back.
Latest posts by Jeff Edwards (see all)
- 17 Security Blogs You Should Be Reading in 2017 - September 14, 2017
- The Equifax Hack: What You Need to Know - September 12, 2017
- SentinelOne Introduces ‘Deep Visibility Module’ for IOC Search and Threat Hunting on the Endpoint - September 8, 2017