Showing Blog Posts: 1–10 of 120 tagged Hackers and Threats

  • Network Attacks and Exploitation: A Framework

    by Ben Rothke on October 2, 2015

    The phrase think like a hacker is bandied about incessantly. For most people, they can’t think like a hacker any more than they could think like a podiatrist or a CPA. With that, in Network Attacks and Exploitation: A Framework, (Wiley 978-1118987124), author Matthew Monte has written a great guide that while it won’t help you think like a hacker; it will provide you with the knowledge of how to…

  • Augmented Reality Law, Privacy, and Ethics: Law, Society, and Emerging AR Technologies

    by Ben Rothke on September 19, 2015

    The legal field is always catching up to advances in technology. Once of the many examples is the Digital Millennium Copyright Act (DMCA), which only went into effect in 1998. About 7 years after the creation of the world wide web. In Augmented Reality Law, Privacy, and Ethics: Law, Society, and Emerging AR Technologies, author and attorney Brian Wassom provides a forward thinking approach to how…

  • Criminals Use CEO Emails to Target Companies

    by RSAC Contributor on September 3, 2015

    That email from the CEO in your inbox may not be real. Stop and pick up the phone to make sure it's legitimate before you take action. The FBI said cybercriminals stole nearly $750 million from more than 7,000 companies in the United States between October 2013 and August 2015. When you include international victims, total losses from busness-to-email attacks exceed $1.2 billion. Attackers, …

  • Forget IoT. Your Antivirus is under Heavy Fire

    by RSAC Contributor on September 1, 2015

    This post comes from Bogdan Botezatu, a security researcher with BitDefender. While the general public awaits the IoT apocalypse, the rest of us know the real threat actually runs much deeper. Highly skilled and extremely well financed computer experts are targeting the apex link in the security ecosystem: the anti-malware vendor itself. Recent revelations have shown the National Security Agency…

  • RSA Conference Asia Pacific Japan Sessions Thursday Preview

    by Fahmida Y. Rashid on July 23, 2015

    RSA Conference Asia Pacific Japan 2015 kicks off its first day of sessions Thursday morning. These speakers and sessions have been carefully curated because they provide a regional perspective to major security issues facing the Asia-Pacific region. There are plenty of sessions providing strategic security insights, such as Zulfikar Ramzan discussing strategic incident response planning in You’ve…

  • How We Foiled Ransomware and Got the Files Back

    by RSAC Contributor on June 5, 2015

    Derek Soeder is a senior threat researcher at Cylance. In this post, Soeder discusses how he and his team reverse engineered ransomware to recover the password used to encrypt client files. In the interest of length, some of the technical steps the team took have been omitted from this story, but the original is now available on the Cylance website. Read on to find out just what Soeder had to do to…

  • Hijacking Made Easy: Ransomware, Bitcoin, the Dark Web, and Intellectual Property Theft

    by John Linkous on May 27, 2015

    The FBI may have shut down CryptoLocker last year, but researchers report new variants of Cryptolocker have already started infecting users. Other ransomware families continue to make its way into corporate networks. Unlike other, stealthier malware focused on committing intellectual property theft without being seen, CryptoWall and its malware brethren flaunt their presence right in your face. …

  • The Human Element of Computer Security

    by Robert Moskowitz on May 25, 2015

    Most organizations spend significant sums on high-tech defenses such as firewalls, anti-virus software, intrusion detection systems, and biometric locking devices as part of their computer security efforts. But even the strongest hardware and software defenses cannot withstand the human element. The damage can be inflicted intentionally by demotivated employees or unintentionally by…

  • What's Next in Our Security Conversation

    by Fahmida Y. Rashid on May 18, 2015

    There were a lot of interesting conversations at RSA Conference last month. With everyone back home and back to the pressures of the daily job, what happens next? Where does all that energy and excitement go? Hopefully, it is being channeled into informal conversations and new initiatives. One of the key themes was that security is broken and it needs to change. Every company needs a holistic…

  • Is Defense in Depth Dead? Part 2: The Lesson of Babylon

    by Danelle Au on April 28, 2015

    A few weeks ago, when I asked, Is Defense in Depth Dead? I used the example of Dover Castle to illustrate the point that, as weapons and warfare change, defensive strategies must also evolve to meet new realities. Dover Castle and other fortresses offered their occupants centuries of effective protection—until the advent of gunpowder and cannon on the battlefields of medieval Europe. Which is not…

This document was retrieved from on Sat, 10 Oct 2015 04:58:05 -0400.
© 2015 EMC Corporation. All rights reserved.