Security Wire Weekly


April 6, 2009  8:40 AM

Short-lived Web malware: Fading fad or future trend?

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Attackers are increasingly spreading their malicious code through fly-by-night websites that seem legitimate to unsuspecting users, but are actually laden with malware. Marcos Christodonte II explains how short-lived Web malware works, and how enterprises can use Web filtering, honeytokens and good policy to mitigate the threat.

April 1, 2009  4:05 PM

Is Conficker worth the hype?

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

We talk about the hype surrounding the Conficker worm with Pete Lindstrom, research director at Spire Security. Also, Dave Marcus of McAfee joins us to talk about malware in a down economy.


March 25, 2009  2:02 PM

OWASP security benchmark study; Mobile threats real?

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Boaz Gelbord, who heads the OWASP Security Spending Benchmarks project, explains the survey results. Also, Ivan Arce of Core Security Technologies talks about smartphone threats and penetration testing.


March 23, 2009  4:53 PM

‘Hot Type’: The Truth about Identity Theft

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

In the latest edition of “Hot Type: Security Books in Audio,” author Jim Stickley reveals just how easy it is for a cybercriminal to get access to your employees’ passwords.

And don’t forget to read an excerpt from Jim Stickley’s book: The Truth about Identity Theft.


March 18, 2009  2:23 PM

Security incident response tips; L0phtCrack is back

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Security expert Lenny Zeltser gives tips on how to appropriately respond to a security incident. Also, a discussion on the relaunch of L0phtCrack password cracking tool with Chris Wysopal of Veracode.

L0phtCrack release interview with Chris Wysopal. (video)


March 12, 2009  9:39 AM

Jose Nazario on botnets, cyberwarfare

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

(SOURCE Boston 2009) Botnets are being used more frequently to silence political dissenters, explains Jose Nazario of Arbor Networks. Nazario has been studying the rise of botnets as a tool used in cyberwarfare.


March 6, 2009  10:04 AM

How to use (almost) free tools to find sensitive data

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

No matter how much security awareness training employees get, some of them will still store sensitive data in insecure places. As a security manager, finding that data becomes of paramount importance — but how to do it? In this tip, John Soltys offers advice on ways to find insecurely stored data.


March 4, 2009  5:47 PM

PCI officials on data breaches, PCI DSS

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

PCI Council general manager Bob Russo and Council chairman Lib de Veyra talk about the PCI Council’s goals in 2009. Russo is frank about the latest data breaches. Also a discussion about virtualization security with Steve Herrod of VMware.


February 25, 2009  11:10 PM

Attacks against SSL

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Cryptography expert Taher Elgamal of Axway Inc. defends SSL in the wake of research that bypasses it. Elgamal’s research led to the development of SSL.


February 23, 2009  3:56 PM

How to block adult websites from enterprise users by logging content

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Inappropriate content has always been a problem for enterprise security teams. What are some best practices for blocking adult content and websites from systems? In this security management tip, learn strategies for keeping users’ Web habits in check.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: