Articles on Malware
- Malware Evolving Threats: The Long Tail of Potential Data Breach Victims The "long tail" of potential breach victims—numerous SMBs comprising 80% of the population—attracts attackers who prefer quantity over quality. These targets have weaker defenses and there are many...
- Malware Protect Files From Malware With Windows Integrity Levels Windows integrity levels can protect sensitive files from malware. Use the Chml tool to set a file to High integrity level with "no read up" policy enabled. Since malware typically runs at Medium...
- Malware Protect Processes from Spyware With Windows Integrity Levels Windows mandatory integrity levels (Low/Medium/High) can protect against keyloggers. User-mode malware typically runs at Medium level; launching sensitive applications like password vaults with "Run...
- Malware 4 Steps to Combat Malware Enterprise-Wide: New Article Treating malware infections as independent events--cleaning up and moving on--doesn't keep pace with evolving attack tactics. Effective enterprise malware defense requires detecting propagation...
- Malware Understanding Computer Attack and Defense Techniques Modern attacks combine social engineering to bypass technical defenses, client-side exploits targeting browsers and add-ons, web application vulnerabilities like SQL injection, and persistent...
- Incident Response Incorporating Mobile Devices into Enterprise Security Enterprise security hasn't kept up with consumerization—powerful mobile devices often have VPN access and email but lack mature OS security controls. Organizations need greater network segmentation,...