In Network Security We are Always in a Battle of Wits Against the Attackers...This week marks the official start of a new school year...
Hi, what are you looking for?
In Network Security We are Always in a Battle of Wits Against the Attackers...This week marks the official start of a new school year...
If Your Organization Has Information That is Valuable Enough to Keep Private, Then There is Value For An Attacker in Stealing It...
The More We Understand About How the Bad Guys Operate, The Better off We Will Be...
For many years network security has taken something of a primarily reactive, top-down mentality to dealing with threats. For example, when a new malicious...
While The Immediate Risk of "Flame" is Low, Attackers Could Adapt Its Techniques and Repackage Them Into New Malware
Jericho Botnet Analysis: Infection, Persistence and Malicious FunctionsWe’ve talked a lot about modern malware as a concept, but I’d like to use this week’s...
When it Comes to DDoS Attacks, it’s Important to Remember That There Will Likely Never be a Single Silver Bullet.
Network attacks and breaches have dominated the technical and mainstream news for the past 18 months, as attacks have grown both in volume and...
Microsoft made lots of news recently with the disclosure that a key vulnerability (MS12-020) involving the RDP protocol had been leaked, apparently from Microsoft’s...
If we don’t have a solid notion of what is normal in our environments, it’s highly unlikely that we will notice the new threat...
Botnet takedowns are good for the industry, but our local controls are really the only security measures that we can rely on to protect...
There are Tons of Applications and Code out there that are not Overtly Malicious, yet do Spyware-like Things Without the user’s Knowledge and Reduce...