Articles on Malware
- Social Networking Explaining Computer Security Terms to Ordinary People Technical jargon that security professionals use daily may be meaningless to non-IT people. A collaborative effort with SANS Institute defines commonly-used security terms like firewall, exploit, and...
- Malware 5 Events in 2011 That Challenged Online Security and Trust Assumptions
- Malware Using Netsh for Easier Network Setup in a Malware Lab Windows' netsh tool can save and restore network configurations, useful for malware analysis labs that frequently switch between isolated segments and Internet-connected networks. Save configurations...
- Malware The Dark Side of Remote Desktop The Morto worm spread by scanning for RDP on port 3389 and brute-forcing Administrator passwords using common credentials. Tools like TSGrinder and Ncrack automate RDP password attacks. Mitigations...
- Malware Can We Rely on the Antivirus' Ability to Disinfect a System? When antivirus detects malware that already executed, clicking "Remove" and moving on is tempting but risky. Other undetected malware may remain, or attackers may have already expanded their...
- Malware How Antivirus Vendors Describe Their Cloud Capabilities Cloud antivirus uses lightweight endpoint agents that send file details to provider infrastructure for analysis, allowing the broader user community to benefit from processed data. Major vendors...