Tutorials

Photo Story: Malware and art collide

For the first time ever, it is possible to visualise the malware code through artistic visualisation and computational technology.

The worlds of IT security and art joined together as Message Labs exhibited a collection of cyber threats turned into graphical computer images.

The exhibition was opened in Covent Garden, London, and is the first time ever that images had been developed which visualized cyber threats using the actual computer code of the malware.

The process worked with Message Labs generating a machine code disassembly of the malware, which was then provided to computational artist Alex Dragulescu, who with the aid of his own computer program created the images.

Alex Shipp, senior anti-virus technologist and imagineer at Message Labs said: "It was a collaboration between Message Labs and the artist. We selected 16 different pieces of malware and fed it in to him. It was up to him to generate the features, such as the tentacles and tendrils."

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Dragulescu was only artistically involved in associating code with each graphical feature, and choosing colours. The software was deterministic, so each individual malware feature was the same for all.

Adrian Chamberlain, CEO of Message Labs, said: "For our teams of researchers that obsessively track this evolution and stop these threats in their tracks, around the clock and around the world, being able to 'stare the enemy through the eye' through Alex's art is fascinating."

"No-one knew what threats look looked like - they represent the underworld of the internet that we try to stay one step ahead of each and every day."

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/policy-legislation/data-governance/354496/brexit-security-talks-under-threat-after-uk-accused-of
data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
Visit/security/cyber-security/354468/if-not-passwords-then-what
cyber security

If not passwords then what?

8 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020
Visit/policy-legislation/31772/gdpr-and-brexit-how-will-one-affect-the-other
Policy & legislation

GDPR and Brexit: How will one affect the other?

9 Jan 2020