Security Wire Weekly:

September, 2012

1

September 25, 2012  8:34 PM

Email attacks still highly successful attack vector

Robert Westervelt Robert Westervelt Profile: Robert Westervelt

Ali Mesdaq a security researcher at FireEye Inc. explains why malicious file attachments are still a highly successful attack vector for cybercriminals. Automated attack toolkits, spambots and targeted attackers typically use the old standby technique because it works. FireEye has found a spike in...

September 20, 2012  6:42 PM

Flame malware analysis, How to defend against fraudulent certificates

Eric Parizo Eric Parizo Profile: Eric Parizo

Security expert Nick Lewis analyzes Flame malware, plus gives tips for dealing with Flame's most unique function: its use of fraudulent certificates.


September 19, 2012  12:54 PM

Formulate a more effective information security incident response plan

Eric Parizo Eric Parizo Profile: Eric Parizo

In this Hot Type podcast, author Neal McCarthy offers real-world examples that enterprises can use to form an information security incident response plan.


September 12, 2012  4:54 PM

Legal counsel vital component of incident response

Robert Westervelt Robert Westervelt Profile: Robert Westervelt

Ellen Giblin an attorney at Ashcroft Law and Gant Redmon, the general counsel for Co3 Systems discuss the litigator's role in incident response. The legal team should be contacted as soon as a security or privacy incident is detected because it shifts the burden and liability over to the attorney,...


September 7, 2012  7:10 PM

Google Aurora attackers back with zero-day exploits, new targeted attack techniques

Robert Westervelt Robert Westervelt Profile: Robert Westervelt

The Aurora attackers, which surfaced in 2009 targeting Google and dozens of other firms are improving their techniques and showing impressive skills, according to new research from Symantec. The group is a threat to U.S. defense contractors and their partners, including manufacturers and parts...


September 5, 2012  7:51 PM

The case for using anomaly based monitoring in zero day detection

Eric Parizo Eric Parizo Profile: Eric Parizo

In light of recent failures by the signature-based model, expert Char Sample discusses anomaly-based monitoring technology and the potential it holds for enterprise security.


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: