marketing
We often overestimate our immunity to threats in many situations. This notion, and the related principle of invulnerability,...Read more
My earlier posts presented malvertising examples and explored how malicious ads work and how they get deployed and...Read more
My earlier posts looked at examples of malvertising campaigns, explored how malicious ads function and how they are...Read more
My earlier posts looked at examples of malvertising campaigns and explored how malicious ads function. In this note I...Read more
My earlier post discussed examples of high-profile malvertising campaigns as a starting point for exploring the malicious...Read more
Internet advertisement networks provide attackers with an effective venue for targeting numerous computers through malicious...Read more
Business managers use the term growing the pie to describe a scenario where the company's actions increase the overall...Read more
Your non-security colleagues or clients probably have a hard time telling whether you are doing your job well, unless you...Read more
The maturing antivirus industry exhibits several dynamics reminiscent of the cold medicine sector. This isn’t a...Read more
The "long tail" of small and mid-sized businesses (SMBs) forms an attractive set of potential victims for attackers. These...Read more