- Malware How Antivirus Vendors Describe Their Cloud Capabilities
Cloud antivirus uses lightweight endpoint agents that send file details to provider infrastructure for analysis, allowing the broader user community to benefit from processed data. Major vendors...
- Incident Response How a Data Security Breach Can Be Used for Good PR
Hershey turned a website breach into positive PR by emphasizing that the attacker only modified a single baking recipe. Headlines focused on the quirky detail rather than consumer data exposure....
- Malware Analysis Virtualized Network Isolation for a Malware Analysis Lab
Default VMware host-only networking allows the physical host to interact with virtualized lab systems through a virtual adapter. For better isolation, create a dedicated virtual network (e.g.,...
- Malware Enterprises Won't Adopt Adobe Reader X Any Time Soon
Adobe Reader X's Protected Mode sandbox significantly improves security, yet 56% of enterprise installations ran vulnerable older versions. Organizations lack skills for large-scale non-Microsoft...
- Social Networking Similarities Between Riots and Modern Internet Hacktivism
Riots and hacktivism share dynamics: de-individuation provides impunity, instigating events assemble crowds and signal intentions, and "entrepreneurs" take first risky actions expecting others to...
- Malware Analysis Learning Malware Analysis Through Practice
Deliberate practice is critical for developing malware analysis skills—experimenting with specimens in laboratory environments builds hands-on expertise beyond reading or classroom learning....