- Malware Can We Rely on the Antivirus' Ability to Disinfect a System?
When antivirus detects malware that already executed, clicking "Remove" and moving on is tempting but risky. Other undetected malware may remain, or attackers may have already expanded their...
- Malware How Antivirus Vendors Describe Their Cloud Capabilities
Cloud antivirus uses lightweight endpoint agents that send file details to provider infrastructure for analysis, allowing the broader user community to benefit from processed data. Major vendors...
- Incident Response How a Data Security Breach Can Be Used for Good PR
Hershey turned a website breach into positive PR by emphasizing that the attacker only modified a single baking recipe. Headlines focused on the quirky detail rather than consumer data exposure....
- Malware Analysis Virtualized Network Isolation for a Malware Analysis Lab
Default VMware host-only networking allows the physical host to interact with virtualized lab systems through a virtual adapter. For better isolation, create a dedicated virtual network (e.g.,...
- Malware Enterprises Won't Adopt Adobe Reader X Any Time Soon
Adobe Reader X's Protected Mode sandbox significantly improves security, yet 56% of enterprise installations ran vulnerable older versions. Organizations lack skills for large-scale non-Microsoft...
- Social Engineering Similarities Between Riots and Modern Internet Hacktivism
Decentralized hacking groups operate without formal leadership, yet they coordinate like mobs in a riot. De-individuation, instigating events, and risk-taking 'entrepreneurs' drive both, and...