Malware
In the ongoing war against malware threats, you need tools that will baseline your system, detect vulnerabilities, and remove existing malware.
Articles about Malware
-
How to respond to a malware incident
When malware is suspected don't jump the gun on diagnosis and countermeasures. Follow these best practice guidelines to ensure an appropriate and measured response.
-
Malcovery Security: The company spammers and phishers hate
When a start-up company helps take down several major online spam and phish operations, it's time to look at what they are doing right.
-
National Computer Forensics Institute: Demystifying cybercrime
Knowing how to handle digital evidence and discovery correctly prevents costly mistakes. A federal facility in Birmingham, Alabama is working hard to improve that situation.
-
UAB takes aim at spammers, phishers, and purveyors of malware
Birmingham, Alabama, is fast becoming a hotspot for digital crime fighting. Together, let's learn what they're doing right.
-
Breach Detection Systems take aim at targeted persistent attacks
You've just been told to get a Breach Detection System in place. Where do you start? How about a buyer's guide created by an independent test facility?
-
Worst IT fail ever? US agency spends millions in useless security
A branch of the U.S. Commerce Department recently trashed perfectly good computers and wasted millions on a bogus malware infection. How did this happen?
-
Email encryption: Using PGP and S/MIME
For those worried about the security and privacy of email communications, encryption is one layer to add, but using encryption software isn't terribly user-friendly.
-
Band of brothers: Vendor partnerships strengthen security for all
Security vendors who band together on solutions instead of persisting in adversarial relationships with one another should be the favored providers for IT departments.
-
Why 'Nothing to Hide' misrepresents online privacy
A legal research professor explains to Michael P. Kassner why we should think long and hard before subscribing to the "Nothing to Hide" defense of surveillance and data-gathering.
-
Cyberwarfare: Mounting a defense
Both private and public organizations are at risk for cyberwarfare attacks and must take responsibility for network defense. Tom Olzak outlines security best practices.
-
Does using encryption make you a bigger target for the NSA?
Fact: The U. S. government is capturing data from its citizens. Fact: Encrypted data is of more interest to the U.S. government. Michael P. Kassner asks two experts, one legal, one cryptographic, what...
-
Everything you need to know about using TOR
TOR's anonymizing and encrypting features make it a very useful tool for privacy. Here's a quick look at the basics.
-
[Infographic] Wiretapping: Privacy vs. security
This infographic traces the history of the privacy vs. security debate in the U.S. from the Bill of Rights to PRISM.
-
Cyberwarfare: Characteristics and challenges
The specter of cyberwarfare isn't just a problem for governments -- many types of organizations could be in the line of fire. Knowing the types of attacks and their probability will help you prepare.
-
Convenience or security: You can't have both when it comes to Wi-Fi
Open Wi-Fi networks can be a godsend when you need them. Michael P. Kassner interviews a network-security expert who explains why bad guys like them even more.