threats
When characterizing ill-effects of malicious software, it's too easy to focus on malware itself, forgetting that behind...Read more
When engaged in a fight, it's natural to ask yourself whether you are winning or losing. However, in the context of...Read more
One of the most effective methods of compromising computer security, especially as part of a targeted attack, involves...Read more
Phishing—a technique grounded in social engineering—remains an effective way for attackers to trick people into...Read more
Denial of Service attacks (DoS) affect numerous organizations connected to the Internet. They disrupt normal business...Read more
2011 is only three-quarters through. Yet, so much has already happened in the world of infosec this year that I’d...Read more
My earlier posts presented malvertising examples and explored how malicious ads work and how they get deployed and...Read more
My earlier posts looked at examples of malvertising campaigns, explored how malicious ads function and how they are...Read more
My earlier posts looked at examples of malvertising campaigns and explored how malicious ads function. In this note I...Read more
My earlier post discussed examples of high-profile malvertising campaigns as a starting point for exploring the malicious...Read more