IT Trenches:

malware


December 3, 2009  7:02 PM

CERT ALERT:H1N1 Malware Campaign Circulating



Posted by: Troy Tate
alert, botnet, bulletin, CERT, cert alert, education, government, information security, information security awareness, malicious software, malware, us-cert, user education, warning

The US-CERT released an alert yesterday about a currently circulating malware threat with the H1N1 virus as the subject matter.

...

September 16, 2009  6:41 PM

Google search results serve up malware – I’ve had the crime of my life



Posted by: Troy Tate
browser security, drive-by attack, Google, information security, malicious software, malware, search results, software, software security

Well, that may not be news to you. However, there is a recent trend in malware propagation that uses Google as the portal to deliver payloads to visitors. Unsuspecting users go to Google and search for topics such as Patrick Swayze's death or the controversy about Serena Williams cursing at the...


September 16, 2009  6:31 PM

Would you click if it showed on the NY Times website? – Really would you?



Posted by: Troy Tate
ad revenue, browser security, computer network, hardware, information security, information security management, licensing, malicious software, malware, network access, PC, permit, Security, social engineering, software, user education

Yesterday Fierce CIO reported that New York Times falls victim to rogue ad. This is a trend that seems to be happening more frequently. Rogue...


August 28, 2009  4:21 PM

BlackHat USA technical presentations available online – not just for hackers



Posted by: Troy Tate
antivirus, blackhat, bootkit, Database, Development, education, hacker, information security, infosec, least user authority, least user privilege, malware, research, rootkit, threats, vulnerabilities

The media archives have now been posted on the BlackHat website from the BlackHat technical conference held in July 2009. This is the place to go if you want to see some of the latest information security...


August 24, 2009  8:33 PM

Red alert – automated SHIELDS Up – malware becomes smarter!



Posted by: Troy Tate
bot, command and control, information security, malware, malware research, threat, vulnerability

If you haven't recently kept up to date on the malware front, a recent article at DarkReading may come as a surprise to you. ALERT: Malware has become intelligent!


August 14, 2009  12:48 PM

Bootkit – rootkit – malware bypasses disk encryption!



Posted by: Troy Tate
antivirus, blackhat, bootkit, hacker, least user authority, least user privilege, malware, research, rootkit, threats, vulnerabilities

If you have not been nervous before about someone infecting computers without your knowledge then you should be much more nervous after reading this article. In 1987 the Stoned boot sector virus came out and was one of the...


June 24, 2009  6:24 PM

Did you see this? – SYSTEM CLEANING: GETTING RID OF MALWARE FROM INFECTED PCS



Posted by: Troy Tate
anti-virus, antivirus, av, availability, bot, botnet, information security, integrity, malicious software, malware, registry, Security, trojan

I don't know about you but I do get frustrated when a white paper is advertised and it has little or no meat to it. Most times it seems like the whitepapers offered by vendors today are light marketing fluff with little substance to help IT folks do their job better. I came across a...


April 2, 2009  8:53 PM

5 Things we learned from the Conficker non-event



Posted by: Troy Tate
anti-virus, antivirus, Conficker, endpoint, endpoint protection, information security, lessons learned, malware, Microsoft, network, patches, patching, predicting future, Security

1. The media can take a story about Information Technology and say nothing of substance. What did the 60 Minutes story do for the IT industry? It made Symantec look like they could not effectively...


February 11, 2009  8:08 PM

Tracking down that user/computer that locks AD accounts



Posted by: Troy Tate
account management, Active Directory, AD, administration, analysis, anti-virus, antivirus, Data security, diagnostics, howto, information security, malicious activity, malware, Microsoft, Microsoft Windows, network security, Password, password management, policy enforcement, reporting, risk, risks, scanning, search, Security, security notification, tools, troubleshooting, Windows

With an environment spanning 18+ sites and more than 3000 computers around the globe, you could understand how challenging it would be to track down what device/user might be locking user accounts. There are tools out there that you can pay for that can help do this. However, Microsoft has some...


January 29, 2009  9:13 PM

Nifty tools for tracking down that “interesting” network traffic



Posted by: Troy Tate
Cisco, LAN, malware, Microsoft, network analysis, network monitor, network troubleshooting, pstools, Routers, Security, Sysinternals, toolkit, troubleshooting, WAN

My previous posting was meant to help you determine the source of potentially dangerous...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: