Ken Dunham

Ken Dunham

Nampa, Idaho, United States
24K followers 500+ connections

About

30 years of consulting experience in cybersecurity leadership, incident response, dark…

Articles by Ken

See all articles

Activity

Join now to see all activity

Experience

  • Qualys Graphic
  • -

    Remote

  • -

    Idaho

  • -

    Global

  • -

  • -

  • -

    United States

  • -

  • -

  • -

Education

  • Eastern Oregon University Graphic

    Eastern Oregon University

    Joseph D. Novack's theories on learning how to learn, Gartner on multiple intelligences, and studies in the classroom for alternative assessment of multiple intelligences utilizing semantic mapping and rubrics.

Licenses & Certifications

Publications

  • Android Malware and Analysis

    CRC Press

    The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware threats and analysis.

    Other authors
    See publication
  • Mobile Malware Attacks and Defense by Ken Dunham

    Syngress

    Also available in Chinese at https://www.amazon.com/9787030345752-Genuine-malicious-attacks-prevent/dp/B008RGFQPS/ref=sr_1_3?ie=UTF8&qid=1551116028&sr=8-3&keywords=%22ken+dunham%22.

    See publication
  • Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet

    Auerbach Publications

    Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of “botmasters”. This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of…

    Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of “botmasters”. This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of bots.
    With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew, one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace – how criminals make money off of your computer – are also a focus of this exclusive book!

    With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer.

    Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively protect their own networks from such attacks.

    Other authors
    See publication
  • Bigelow's Virus Troubleshooting Pocket Reference (Pocket References

    McGraw-Hill

    Identify, Diagnose and Combat Computer Viruses Now!

    With the growing number of viruses infecting computers - and an increasing level of damage - safeguarding your system has never been more important than now. This useful pocket reference shows you how to detect viruses, what steps to take once infected, and how to prevent future attacks. Concise and thorough, this handy guide contains all you need for diagnosing and troubleshooting destructive computer viruses - including the newest…

    Identify, Diagnose and Combat Computer Viruses Now!

    With the growing number of viruses infecting computers - and an increasing level of damage - safeguarding your system has never been more important than now. This useful pocket reference shows you how to detect viruses, what steps to take once infected, and how to prevent future attacks. Concise and thorough, this handy guide contains all you need for diagnosing and troubleshooting destructive computer viruses - including the newest generation of network email worms.

    Inside you'll find out about:

    Exposed Virus Myths and Hoaxes
    Antivirus Laws
    Symptoms of Infection
    Antivirus Software Scanning Methods
    Submitting Virus Samples for Analysis
    Repair and Rescue of Damaged or Lost Files
    Virus Reinfection and Risky Behavior
    Essential Emergency Software
    Alternative Operating Systems and Procedures
    Recommended Removal Procedures
    Renowned anti-virus professional Ken Dunham reveals various troubleshooting scenarios, making this practical reference invaluable for all computer professionals and technicians.

    See publication
  • HyperCard Roundup

    Self-Published

    Printed and electronic book, including source code, for programming HyperText applications on Macintosh.

  • AVIEN Malware Defense Guide for the Enterprise

    Syngress

    Contributed Wicket Rose & NCPH Hacking crew exclusive, pages 194-200, 219.

    See publication

Courses

  • Cyber Security Interdependencies Summits

    -

  • Cyber Storm I & II (DHS) - cyber exercise

    -

  • Operation Silent Horizon (CIA) - cyber exercise

    -

Projects

  • Merryxmas Watcher 2.0

    -

    Top downloaded Macintosh software in the world, with over 1M downloads a month; freeware antivirus.

Honors & Awards

  • ISSA International Article of the Year Award

    ISSA International

    Troubling Trends in Espionage, ISSA Journal, 2015. For more information on the paper or to contact me directly visit my website at http://4d5asecurity.com/issa-international-article-of-the-year.

  • Article of the Year Award: “Trouble Trends of Espionage”

    ISSA

  • ISSA Distinguished Fellow

    ISSA.org

    Recognized as a Distinguished Fellow within the international body of ISSA, reserved for the top 1% of professionals globally.

  • ISSA International Distinguished Fellow

    ISSA

    Distinguished Fellow reserved for just 1% of security professionals globally.

  • Innovation Award

    iSIGHT Partners

    Innovation award for development of HoneySting, an automated large scale drive by evaluations and collections appliance for security intelligence operations.

  • Exemplary Leadership Plaque

    ISSA

    Presented by Howard Schmidt

  • Global Top Quoted Security Expert

    Hill & Knowlton

  • National Awards for Philanthropy Development & Academic Improvement

    AKL

    Major innovation and improvement of philanthropy and academic programs for AKL.

  • “The Best” Honor from Yahoo Internet Life, AOL, & PC Week

    Varied

    Number one website for anti-virus as recognized by many industry leaders at the time. Following of over 350,000 which was large during this time frame in Internet history.

  • Presidential Teacher of the Year Nominee

    Oregon Science Teachers Association (OSTA)

  • Teacher of the Year (Region 7)

    Oregon Science Teachers Association (OSTA)

  • Dean’s Highest Honors for Academic Achievement

    Oregon State University

  • Featured Expert: “Cryptology” Film

    Educational Management Group

  • World Silver Medalist: HyperText Programming Challenge

    -

Organizations

  • ISSA, ISC2, ISACA, GIAC, Idaho InfraGard, HTCIA

    Officer or leader in most

  • Major Malcode Mitigation (M3), Security Institute at IEEE

    Group Leader

  • Media Representative (Prime-Time TV Advertising)

    Media Representative

    About.com prime-time TV advertisements after going IPO.

Recommendations received

13 people have recommended Ken

Join now to view

More activity by Ken

View Ken’s full profile

  • See who you know in common
  • Get introduced
  • Contact Ken directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Ken Dunham in United States