- Malware What is an Exploit Kit?
Exploit kits are toolkits that automate exploitation of client-side vulnerabilities, targeting browsers and plugins like Adobe Reader, Java, and Flash. Key characteristics include ease of use by...
- Social Networking Social Networking: Been There, Done That, But Something Is Different
- Web Security Time to Let Go of Java in the Web Browser: How to Disable It
Java exploits have become the top moneymaker for exploit kit authors, yet few people regularly use Java in browsers. The likelihood of being targeted overpowers the benefits. Disable Java in browsers...
- Malware Specialized Honeypots for SSH, Web and Malware Attacks
Specialized honeypots for different attack types: Kippo logs SSH brute force and records shell interactions, Glastopf emulates web vulnerabilities like RFI and SQL injection, Dionaea collects malware...
- Malware What Is Cloud Anti-Virus and How Does It Work?
Cloud anti-virus uses lightweight endpoint agents that offload analysis to provider infrastructure—less system strain, smaller attack surface. Agents submit file metadata (hashes, behavior, origin)...
- Malware What is Malware?
Malware is code used to perform malicious actions—taken against the victim's interests with intent. Whether a program is malware depends not on capabilities but on how attackers use it. Behind...