Latest Blog Posts
June 08, 2015 Added by:Ronnie Tokazowski
In the early days of malware, we all remember analyzing samples of IRC botnets that were relatively simple, where the malware would connect to a random port running IRC, joining the botnet and waiting for commands from their leader. In this day and age, it’s slightly different.
June 04, 2015 Added by:Eduard Kovacs
The trust-based foundations of whitelisting make it more difficult for organizations to properly protect their networks against cyber threats, Kaspersky Lab researchers have warned.
June 04, 2015 Added by:Anthony M. Freed
Do-it-yourself malware toolkits have been available on the black market for a long time, but now researchers have discovered the first ransomware variation for creating your own extortion campaigns – and it’s free to use.
June 04, 2015 Added by:Aaron Higbee
There is an entire cottage industry of people who go to great lengths to upgrade partial data to make it more valuable. On the Dark Web, one can easily find postings buying and selling this kind of partial information.
June 03, 2015 Added by:Peter Zavlaris
The unprecedented technological advancement seen over the last two decades has become a double-edged sword. As a result, information security has gone from being a tertiary IT function to a significant operational risk.
June 03, 2015 Added by:Patrick Oliver Graf
These days, you need a password to access every aspect of your digital life, and we all know how problematic that can be.
June 02, 2015 Added by:Brian Prince
Bots are busy little bees on the Internet, and the world of mobile computing may be their next frontier.
June 02, 2015 Added by:Anton Chuvakin
What it all means is that you are buying on faith. There is nothing wrong with it, by the way, but it is useful to be honest about it…
June 01, 2015 Added by:Eduard Kovacs
Kaspersky Lab has published a report detailing the botnet-assisted distributed denial-of-service (DDoS) attacks launched by malicious actors in the first quarter of 2015.
June 01, 2015 Added by:Anthony M. Freed
The U.S. Department of Commerce’s Bureau of Industry and Security (BIS) has released the proposal for regulatory control of the export of malware and zero-day exploits for a sixty-day public comment period, and the reaction from the security community and other interested parties is already definitively negative.
June 01, 2015 Added by:Tripwire Inc
We must also keep a clear mind on one important fact: to acquire what can be dynamic and intangible, and time sensitive artifacts in the early stages of an investigation presents of highest opportunity of success.
June 01, 2015 Added by:Joe Weiss
One of the most important aspects in addressing ICS cyber security is the concept of “systems of systems”.
May 28, 2015 Added by:Eduard Kovacs
Security researchers, companies and organizations have joined forces in a new non-profit global initiative whose goal is to secure smart cities.