Tutorials

Photo Story: Malware and art collide

For the first time ever, it is possible to visualise the malware code through artistic visualisation and computational technology.

The worlds of IT security and art joined together as Message Labs exhibited a collection of cyber threats turned into graphical computer images.

The exhibition was opened in Covent Garden, London, and is the first time ever that images had been developed which visualized cyber threats using the actual computer code of the malware.

Advertisement - Article continues below

The process worked with Message Labs generating a machine code disassembly of the malware, which was then provided to computational artist Alex Dragulescu, who with the aid of his own computer program created the images.

Alex Shipp, senior anti-virus technologist and imagineer at Message Labs said: "It was a collaboration between Message Labs and the artist. We selected 16 different pieces of malware and fed it in to him. It was up to him to generate the features, such as the tentacles and tendrils."

Dragulescu was only artistically involved in associating code with each graphical feature, and choosing colours. The software was deterministic, so each individual malware feature was the same for all.

Adrian Chamberlain, CEO of Message Labs, said: "For our teams of researchers that obsessively track this evolution and stop these threats in their tracks, around the clock and around the world, being able to 'stare the enemy through the eye' through Alex's art is fascinating."

Advertisement
Advertisement - Article continues below

"No-one knew what threats look looked like - they represent the underworld of the internet that we try to stay one step ahead of each and every day."

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/mobile/google-android/356373/over-2-dozen-additional-android-apps-found-stealing-user-data
Google Android

Over two dozen Android apps found stealing user data

7 Jul 2020
Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/cloud/356260/the-road-to-recovery
Sponsored

The road to recovery

30 Jun 2020