• U.S. government warns of point-of-sale malware campaign

    The U.S. government has divulged details on the "Backoff" point-of-sale malware campaign, which purportedly targets remote access software for entry.

    Brandan845 pointsBadges:
  • RTF security: Avoiding embedded malware

    The Zeus malware is threatening RTF security by embedding itself in the file, which is commonly seen as safer than other file formats such as PDFs. Learn how to prevent the threat.

    editor13,335 pointsBadges:
  • Don’t let Linux malware problems trouble your servers

    Malware on a Linux server? It can happen, but with a few tools you can monitor for, prevent and fix rootkit attacks.

    svanvugt805 pointsBadges:
  • Turla spyware: Defending against undetectable malware

    Is there a way to detect malware that's designed to avoid detection? Nick Lewis explains how the Turla spyware works and how to defend against it.

    editor13,335 pointsBadges:
  • ‘Poweliks’ malware variant employs new antivirus evasion techniques

    The file-less "Poweliks" malware incorporates a unique combination of antivirus evasion techniques involving the Windows registry to remain undetected on victims' machines.

    Brandan845 pointsBadges:
  • Using whitelisting technology to defend against POS malware

    Learn how whitelisting technology can help protect point-of-sale terminals from being compromised by POS malware.

    ITKE344,705 pointsBadges:
  • Java-based malware: Mitigating the threat of JRE vulnerabilities

    Java-based malware and JRE vulnerabilities are a constant enterprise threat. Expert Nick Lewis reveals how to reduce (or at least tolerate) the risk.

    editor13,335 pointsBadges:
  • Multi-platform Java-based malware: Reducing Java risks

    A new variant of Java-based malware can execute regardless of the operating system used. Nick Lewis explains how to limit the threat.

    editor13,335 pointsBadges:
  • Keys to a successful network-based malware detection deployment

    Network-based malware detection is an attractive alternative to traditional AV, but deployment challenges loom large. Expert Michael Cobb advises.

    searchsecurity20,880 pointsBadges:
  • Finding malware on your Windows box (using the command line)

    Security professionals typically overlook the Windows command line, instead spending their time with more complex GUI-based forensics tools. In this tip, Ed Skoudis explains how just a few command-line tricks can help users closely examine the configuration of a Windows machine and discover whether...

    searchsecurity20,880 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following