Quantcast
Channel: Malware – Global Knowledge
Browsing all 34 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Configuration Management: How Do You Manage the Lifecycle?

Configuration management is the managed maintenance of known configurations of EVERYTHING (code, systems, appliances, work flows, facilities, HVAC, etc.). Keeping track of, confirming, testing, backing...

View Article



Image may be NSFW.
Clik here to view.

Android Malware Much Better At Targeting Vulnerable Phones

Computer criminals are not just interested in targeting desktops and laptop computers. Today more and more malware is being designed for tablets and smart phones.  One case in point is the new strains...

View Article

Image may be NSFW.
Clik here to view.

Attacks Focused on Smartphones Continue to Attract Hackers

While computers and laptops are still a primary focus for hackers, there’s always a desire to reuse old attacks and repackage previously successful hacking techniques. Several examples of this include...

View Article

Image may be NSFW.
Clik here to view.

Can Thinking like a Hacker Help You be More Secure?

Have you ever wondered if thinking like a hacker can help you be more secure? I’d say, yes!  Knowing and understanding their techniques can help you prevent common attacks and exploits. Ethical...

View Article

Image may be NSFW.
Clik here to view.

October is National Cyber Security Awareness Month: How Secure Are You?

October is National Cybersecurity Awareness Month. It’s the perfect time to stop and reevaluate how prepared your personal and company information is for a cybersecurity attack. Does your organization...

View Article


Image may be NSFW.
Clik here to view.

Stopping Hackers Requires Training

Identifying areas of security within a network requires a 24/7 strategy to keep botnets and cyber criminals out of your network. Ultimately, cyber attacks can bring businesses to a grinding halt,...

View Article

Image may be NSFW.
Clik here to view.

9 Cyber Security Threats to Watch Out for in 2013

Malware has been around for a while and is something IT security personnel already know to watch out for. But this software that is used by attackers to disturb operations, gather information, or gain...

View Article

Image may be NSFW.
Clik here to view.

What are Zero Day Exploits?

For several years many articles about computer, network, or Internet compromise mention the phrase “zero day exploit” or “zero day attack,” but rarely do these articles define what this is. A zero day...

View Article


Image may be NSFW.
Clik here to view.

How Do Hackers Uncover New Vulnerabilities and Weaknesses?

A common question is, “How does a hacking programmer learn about a flaw or vulnerability in the first place?” There are many ways new weaknesses or vulnerabilities are uncovered, but the three most...

View Article


Image may be NSFW.
Clik here to view.

Five Security Threats to Address in 2013

Now is a good time to look forward to what we expect the New Year to bring. With this in mind, what threats will security professionals need to address this year? Current trends indicate the following...

View Article

Image may be NSFW.
Clik here to view.

Defending Against an IT Security Threat of Olympic Proportions

If you think defending your company’s network from security attacks is a full-time job, imagine having to pull together a team to protect one of the largest, yet temporary, networks of all time. That’s...

View Article

Image may be NSFW.
Clik here to view.

The Morris Worm Turns 25

In November 1988, the first large-scale malware called the Morris Worm was unleashed on an Internet still mostly populated by academics and technology hobbyists. This wasn’t the first worm to reach the...

View Article

Image may be NSFW.
Clik here to view.

Emily, Ernie, and the Fleecing of a Company

This is the first post in a series examining how information is lost or stolen and how business owners and/or their employees may be the greatest risk to the business. If you are a business owner or...

View Article


Image may be NSFW.
Clik here to view.

CrytpoLocker: A Serious Malware Threat

In early October 2013, a new type of malicious code emerged. Its name is CryptoLocker. This malware is similar in nature to the ransomware attacks seen over the last few years where a victim’s hard...

View Article

Image may be NSFW.
Clik here to view.

New Year, Simple Advice: Lower Cyber Risk and Reduce Liability

The start of a new year is a good time to reiterate cybersecurity best practices and what can happen when we get careless. If anyone believes he or she is immune, it won’t happen to them, or the...

View Article


Image may be NSFW.
Clik here to view.

Social Media Users Beware: Two Million Accounts Compromised

A recent CNN headline read, “2 million Facebook, Gmail and Twitter passwords stolen in massive hack.” This attack began sometime in October 2013 and was discovered in late November 2013 by Trustwave, a...

View Article

Image may be NSFW.
Clik here to view.

The Click That Changed Emily’s Business

As you may recall from Part I of this series, Emily is the sole owner of a small business. She works from a home office and has two employees who also work from their homes. She uses a smartphone, a...

View Article


Image may be NSFW.
Clik here to view.

Social Engineering: How Hackers Hack the Human

According to Donn Parker in Fighting Computer Crime, the weakest link in security is the human. In several presentations and in my writing, I’ve often described the Carbon-Based Problem. With due...

View Article

Image may be NSFW.
Clik here to view.

Security Tips through the Lens of an IP Camera

IP cameras are remote access still and/or video cameras that enable remote monitoring of whatever is in the camera’s view. They have become very popular in recent years as an inexpensive security...

View Article

Image may be NSFW.
Clik here to view.

Who’s the Hacker?

FBI Agent George Wigan: He does fit the profile perfectly. He’s intelligent but an underachiever, alienated from his parents, has few friends—classic case for recruitment by the Soviets. Lyle Watson:...

View Article
Browsing all 34 articles
Browse latest View live




Latest Images