- Malware Learn Better Security Breach PR from Harold Sun's Halfhearted Apology
Herald Sun's website was compromised to serve rogue antivirus, but their brief apology offered few details and underplayed the risk. Better post-incident communications require promptness, clarity,...
- Malware A Delusive Sense of Security in Walled Gardens
Walled gardens like Facebook, corporate networks, and smartphone app stores encourage users to lower their guard, creating false security assumptions that scammers exploit. People click more readily...
- Malware Malvertising: Dealing With Malicious Ads - Who and How?
Ad networks could validate advertisers, research domain registrations, and examine Flash ads for malicious logic—but practices are ineffective or ignored. One organization reduced malware infections...
- Malware Malvertising: The Mechanics of Malicious Ads
Malicious ads redirect victims through chains of domains to exploit kits or social engineering sites. Flash-based ads embed ActionScript logic that can decide when and whom to attack, evade detection...
- Social Engineering The Targeted Attack Potential of Vanity Web Searches
Vanity web searches create targeted attack opportunities. Attackers can create pages with a target's name, wait for Google indexing, then add malware knowing the person will visit when alerts...
- Career Are Mistrustful People Better at Information Security?
Research shows high-trust people are actually better lie detectors than mistrustful ones—their less cautious nature develops social skills for identifying deception. Similarly, security professionals...