Security

Last Updated on 24 April 2015, Total: 69 Blog Posts

  1. Microsoft senses an increasing trend of macro malware

    New threats emerging that include some form of social engineering to convince users to manually enable macros and allow potential malicious code to run... Read More

  2. Dell SecureWorks 2014 Report on Underground Hacker Markets

    The Underground Hacker Markets are booming with counterfeit documents, premiere credit cards, hacker tutorials and 100% satisfaction guarantees... Read More

  3. Email authentication latest threats

    Authentication solves several specific issues related to email, but other problems are completely out of scope. Attackers know this, and have designed some of their attacks accordingly. Perversely, they are actually using authentication to improve the quality of their campaigns... Read More

  4. Malware Compromises 100,000+ WordPress Websites

    Researchers at Sucuri say that the SoakSoak Malware has impacted 100’s of thousands of WordPress specific websites... Read More

  5. Preventing insider attacks

    A Trend Micro’s Security Intelligence blog post groups prevention and mitigation techniques against insider attacks into two categories: technical and non-technical... Read More

  6. Recursive DNS Resolvers Vulnerability

    Recursive DNS resolvers may become stuck following an infinite chain of referrals due to a malicious authoritative server... Read More

  7. Security Predictions 2015: New Challenges and Risk Mitigation Drive Changes to IT Security

    Netwrix shares top security trends that will drive information technology in 2015... Read More

  8. What is DNS Hijacking?

    InfoSec Institute security researcher Ali Qamar describes DNS parameters that you can set in order to prevent DNS Hijacking... Read More

  9. Four Lessons Retailers Should Have Learned from the Target Security Breach

    Netwrix recommends best practices for retailers to maintain security during holiday shopping season... Read More

  10. More on the 19 year old bug

    Although APT3 is well known for employing zero-day exploits in their attacks, recent activity has demonstrated that they will also attack targets with known exploits or social engineering... Read More

Featured Links