- Web Security Time to Let Go of Java in the Web Browser: How to Disable It
Java exploits have become the top moneymaker for exploit kit authors, yet few people regularly use Java in browsers. The likelihood of being targeted overpowers the benefits. Disable Java in browsers...
- Malware Analysis Free Toolkits and Frameworks for Malware Analysis
Open-source sandbox platforms, analysis environments, and AI-assisted tools let you build your own malware analysis capability without commercial licenses. Options include CAPEv2, DRAKVUF Sandbox,...
- Malware Specialized Honeypots for SSH, Web and Malware Attacks
Specialized honeypots for different attack types: Kippo logs SSH brute force and records shell interactions, Glastopf emulates web vulnerabilities like RFI and SQL injection, Dionaea collects malware...
- Social Networking Exploring Facebook's New Social CAPTCHA Authentication
Facebook's "social CAPTCHA" authentication asks users to identify photos of friends when login anomalies are detected—distinguishing legitimate users from imposters. This increases social data's...
- Cloud Getting Started with Cloud Security and Risks - Favorite Frameworks
Key cloud security frameworks: NIST defines cloud computing terminology (SaaS/PaaS/IaaS, deployment models), Cloud Security Alliance provides comprehensive security guidance across governance and...
- Malware What Is Cloud Anti-Virus and How Does It Work?
Cloud anti-virus uses lightweight endpoint agents that offload analysis to provider infrastructure—less system strain, smaller attack surface. Agents submit file metadata (hashes, behavior, origin)...