By: - Dir. Solutions Marketing

Infosec Haiku

July 21st, 2014

Anata no joho sekyuritei konshu no haiku Energetic Bear Attacking ICS Space Havex is Havoc   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is published, [...]



By: - Dir. Solutions Marketing

Infosec Haiku

July 14th, 2014

Anata no joho sekyuritei konshu no haiku Shylock Taken Out Financial Trojan Demands For Pound of Flesh Cease   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if [...]



By: - Independent Computer Security Analyst

@gcluley

Security Tips for Football World Cup Fans

June 13th, 2014

The FIFA World Cup has kicked off in Brazil, with fans travelling to the country from around the globe in the hope that their country’s football team will make it to the grand final. But if you’re travelling (whether it be to South America watch the world’s greatest soccer tournament, or a couple of days [...]



By: - Independent Computer Security Analyst

@gcluley

Who Does China Blame for a Third of All Cyber Attacks Against It? The USA

March 31st, 2014

A few years ago, in what we call the BS era (“Before Snowden”), there were frequent accusations levelled against China for attempting to hack into foreign country’s computer systems and steal information. And, to be fair, there was often good reason to suspect that some attacks were conducted with the endorsement of the Beijing authorities. [...]



By: - Dir. Solutions Marketing

160 New Viruses Captured Every Minute

February 17th, 2014

Periodically, I take a look at what the good folks at AV-Test.org have to say about the amount of malware in their “zoo.” What I’ve been seeing over the past couple of quarters is pretty shocking. 2013 in Review The amount of new malware seen in 2013 jumped to an average of about 6.9M per [...]



By: - Technology Reporter

@jleclaire

Is Mobile Shopping Safer This Holiday Season?

November 26th, 2013

With the holiday shopping season upon us, scammers, cyber criminals and other nefarious characters come out of the Internet woodwork. Security experts are warning consumers should be cautious during the holiday shopping season to protect personal and financial data from being compromised. Banks and retailers should also be on high-alert. Consider just a couple of [...]



By: - IT Security Expert

Employ a Targeted Defense Against Targeted Threats

November 11th, 2013

In my last post, I discussed the reality of APT hitting unsuspecting organizations with a predictable pattern. Study after study indicates people are being hit by malicious hackers and the attack goes on for months before anyone is any the wiser. If they ever know. Some very large companies, with hundreds of business units and [...]



By: - Dir. Solutions Marketing

The Many Forms of Server-Side Risk

October 31st, 2013

We recently worked with the editors at SC Magazine on a reader survey about server-side risk. As expected, companies of all sizes are concerned about varied attack vectors that could allow bad-guy access to their mission-critical data. The results show that malware, server misconfigurations (which lead to malware intrusions) and targeted attacks (aka APTs) are [...]



By: - Chairman and CEO, Lumension

@pclawson

Social Media: the Bad Guys’ Perfect Playground

October 1st, 2013

October marks the 10th anniversary of National Cyber Security Awareness Month, a public education campaign spearheaded by our colleagues at the National Cyber Security Alliance. It’s somewhat disheartening to consider the lack of progress made in cyber security over the last 10 years; cyber criminals continue to wreak havoc stealing personal identities, corporate IP, and [...]



By: - Information Security Reporter

@kevtownsend

Safety Does Not Come First, Goodness, Truth and Beauty Come First

September 24th, 2013

I do not believe when Apple launched the iPhone it had some grand plan to change the very nature of how we work. If it had, the phrase would be Bring Your Own iDevice – and it would surely have been copyrighted. iDevices are consumer products, and as Jean Brodie said, “Safety does not come [...]


By: - Technology Reporter

@jleclaire

Malware Going Rogue

September 16th, 2013

A quick scan of news headlines shows the practical side of cybercrime. As you read this, a fake “Grand Theft Auto V’ torrent is racing to spread its infectious payload. An Advanced Persistent Threat (APT) called NetTraveler is doing its dirty work, most recently via a known Java vulnerability. Fake Xerox emails are delivering malware [...]


A Win-Win for Missouri S&T

September 5th, 2013

Missouri University of Science & Technology faces a set of challenges many post-secondary organizations similarly face. On one side of the problem set, we have a whole fleet of student-owned endpoint devices—over 7,000—connecting to the network without any kind of centralized management because the university only has the means to manage campus-owned systems. On the [...]


By: - Forensics and Security Expert

@phenrycissp

8 Bulletins, 3 Critical for August Patch Tuesday

August 8th, 2013

  IT departments will get a bit of a reprieve this August Patch Tuesday. While 8 bulletins may seem high at first glance, 3 of them are considered critical and just 1 – bulletin 1 – impacts the current code base. With 8 bulletins today, Microsoft’s year-to-date total is 65 patches. For anyone keeping track, [...]


By: - Forensics and Security Expert

@phenrycissp

Are You Ready for Steganography Malware?

July 17th, 2013

Traditionally, the bad guys’ malware bypasses our signature based defenses with some form of obfuscation, like encoding their malware with XOR, base64, gzip etc. or using any of the malware packers tracked by Shadowserver. Penetration testers have long relied upon the capability in Metasploit to render their payloads undetectable to Antivirus programs. Peter Gramantik, a [...]


By: - Chairman and CEO, Lumension

@pclawson

Hacking the Hacker: The Downside to Vigilante Justice

July 2nd, 2013

Imagine you woke up one morning to find all of your possessions gone. Someone broke into your house in the dead of night and stole all of your things. You don’t know how they did it or who it was, but the fact remains: your stuff is gone. You might step outside, see the broken [...]



IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us

blog.lumension.com