Articles on Malware
- Malware Protect Processes from Spyware With Windows Integrity Levels Windows mandatory integrity levels (Low/Medium/High) can protect against keyloggers. User-mode malware typically runs at Medium level; launching sensitive applications like password vaults with "Run...
- Malware 4 Steps to Combat Malware Enterprise-Wide: New Article Treating malware infections as independent events--cleaning up and moving on--doesn't keep pace with evolving attack tactics. Effective enterprise malware defense requires detecting propagation...
- Malware Understanding Computer Attack and Defense Techniques Modern attacks combine social engineering to bypass technical defenses, client-side exploits targeting browsers and add-ons, web application vulnerabilities like SQL injection, and persistent...
- Malware Advanced Persistent Threat (APT) - A Touchy Security Topic APT causes heated debates because it's become a marketing buzzword. Some define it as an attack process with certain characteristics (the "What" group), while Mandiant uses it for specific...
- Incident Response Incorporating Mobile Devices into Enterprise Security Enterprise security hasn't kept up with consumerization—powerful mobile devices often have VPN access and email but lack mature OS security controls. Organizations need greater network segmentation,...
- Networking Pros and Cons of Virtual Patching to Address Vulnerabilities Virtual patching blocks attack vectors exploiting vulnerabilities using IPS, WAF, or database security tools—buying time to develop proper fixes. The danger is complacency: organizations with virtual...