By: - Dir. Solutions Marketing

Tiger Blood, Adonis DNA, Malware … Oh My!

March 10th, 2011

As sure as night follows day, malware follows the meme. And latest meme, apparently, is all Charlie Sheen, all the time. I don’t watch much TV (read: none), and don’t read many celebrity gossip blogs (read: none), but even *I* am painfully aware of Charlie Sheen’s seemingly wacked out 20/20 special and the sundry other [...]



By: - Forensics and Security Expert

@phenrycissp

Yes Virginia, Mac’s Can Get Viruses

July 27th, 2010

Before getting flamed as an Apple basher, first let me state that I like Apple products. I am not foolishly going to disregard the risks of the environment we live / work in today however. In my business and personal life I own 3 Apple laptops, 4 Apple desktops, 2 iPads and 2 iPhones. Along [...]



By: - Chairman and CEO, Lumension

@pclawson

Whitelisting: Fill in the Gaps Where Traditional Efforts have Failed

May 27th, 2010

You’ve probably heard about three recent security-related events that attracted lots of attention. In January, Google announced that it suffered a “highly sophisticated” and targeted hacker attack—originating from China— against its corporate network. In April, an ill-fated false-positive antivirus signature was pushed out that accidentally removed a key part of Windows from machines. And a [...]



By: - IT Security Expert

Moving from a Threat Centric to Trust Centric Endpoint Management Model

October 19th, 2009

There’s been a lot of talk about what role whitelisting will play in the endpoint protection suites of the future.  Opinions dissent about what it will take for whitelisting to become easily implementable for users and whether it will replace or augment the traditional anti-virus approach.  Whatever the opinion, I think most folks can agree [...]



By: - Forensics and Security Expert

@phenrycissp

Sex Still Sells: Malware on the Internet

July 20th, 2009

A new video is reportedly making the rounds on the Internet – supposedly a keyhole camera was used to tape an unsuspecting ESPN Reporter Erin Andrews undressing in a hotel room. While lawyers for Erin Andrews work to have sites posting the video immediately remove it, the bad guys are yet again taking advantage of [...]



By: - Forensics and Security Expert

@phenrycissp

MyDoom Virus Returns with a Vengeance – DDoS Attacks on US and S. Korean Web Sites

July 8th, 2009

An updated virus (MyDoom)- not a botnet is responsible for the DDoS attacks against US and South Korean websites this past weekend. The virus discovered back in 2004 has been updated to now include a list of websites that have become targets of a DDoS attack as the virus spreads. The list of Web sites [...]



By: - Sr. Director Solutions and Strategy

@donleatham

Could a Far-Reaching Microsoft Security Patent Impact iPhone OS?

June 2nd, 2009

The second sentence in a recently granted Microsoft patent (#7,536,726) reads as follows: “The operating system restricts the functionality of the operating system… by limiting the user’s ability to add software applications or device drivers to the computer.” This patent was filed in 2000 when Microsoft Windows was really taking a beating due to the [...]



By: - Dir. Solutions Marketing

Chris’ Security Cache Contemplation: Week 2

May 21st, 2009

Miscellaneous interesting news / tidbits I’ve run across whilst trying to keep up with/clean out my RSS feed … Insider Threat (but mostly to himself). Did you hear about the computer repairman who stole a client’s hard drive and then offered to “retrieve” the data? He was arrested. Epic Fail. Stumping a Virus? Got an [...]



By: - Dir. Solutions Marketing

A Big Mac Attack

May 18th, 2009

Like most readers, I’ve been using computers for a long time. For me it started with the PLATO project at the University of Illinois (Go Illini!!), with its cool touch panels. Then punch cards on mainframes. Then micros, minis … and finally the DOS-based PC. [Remember the dual-floppy drive 5150?] Yup, those were the days [...]



By: - Forensics and Security Expert

@phenrycissp

Nasty Virus / Trojan Lurking in the Wild

April 27th, 2009

With Conficker still fresh on our minds, a new potential menace has emerged.  The remote access capability of a Trojan that spreads like a Virus – W32.Virut.CF (Symantec) or W32/Scribble-A (Sophos) is poised to wreak havoc on networks over the coming days.  Embedding itself deep within infected machines, the Trojan will make it difficult to [...]


By: - Dir. Solutions Marketing

Is Banning Facebook or MySpace the Solution?

February 19th, 2009

According to this by Maryland-based blogger/attorney Judd Legum, the state Office of Legislative Information Services there banned access to Facebook and MySpace last week. And not for the usual time-wasting or inappropriate usage reasons. Nope, it was the “significant increase in viruses and malware … [which they] have determined … are originating from pages hosted [...]


By: - Forensics and Security Expert

@phenrycissp

Is Power Blackout Due to Irresponsible Patch Management in Our Future?

February 6th, 2009

As the security by obscurity veil is lifted from the systems that control and protect our national infrastructure, we are again reminded of the importance of a prudent vulnerability / patch management program. Multiple vulnerabilities in the AREVA e-terrahabitat SCADA system that is used to control core components of power plants and power distribution globally [...]



IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us

blog.lumension.com