Malware monitoring and response.
There are many tools out on the market to respond or monitor to malware incidents and outbreaks, and there are … Read More “Malware monitoring and response.”
There are many tools out on the market to respond or monitor to malware incidents and outbreaks, and there are … Read More “Malware monitoring and response.”
In part one of this series we explained the different stages of the malware life-cycle. This post will cover in … Read More “Malware architectures – part 2 (Exploitation)”
I hear stories all the time of how someone posted information on a social networking site and became a victim … Read More “Antisocial Networking! 10 Ways to stay safe from online thuggery”
There is a great debate over who is responsible for the latest propagation of malware targeting Supervisory Control And Data … Read More “SCADA malware or: How I Learned to Stop Worrying and Love the Bomb.”
Malware has plagued computing for the last three decades. Over time two industries formed; The Anti-Malware companies trying to prevent … Read More “Malware architectures – part 1”
Late last year a security researcher and known malware author decided to perform an experiment with modern day browsers. His … Read More “March of the Evercookies”
Within the last week every major browser has had numerous vulnerabilities released; from CSS trickery to DOM/Javascript overflows. At first … Read More “Browser vulnerabilities”