Security Wire Weekly


April 6, 2009  8:40 AM

Short-lived Web malware: Fading fad or future trend?



Posted by: Jessica Scarpati
Threat Monitor

Attackers are increasingly spreading their malicious code through fly-by-night websites that seem legitimate to unsuspecting users, but are actually laden with malware. Marcos Christodonte II explains how short-lived Web malware works, and how enterprises can use Web filtering, honeytokens and good policy to mitigate the threat.

April 1, 2009  4:05 PM

Is Conficker worth the hype?



Posted by: Jessica Scarpati
Security Wire Weekly

We talk about the hype surrounding the Conficker worm with Pete Lindstrom, research director at Spire Security. Also, Dave Marcus of McAfee joins us to talk about malware in a down economy.


March 25, 2009  2:02 PM

OWASP security benchmark study; Mobile threats real?



Posted by: Jessica Scarpati
Security Wire Weekly

Boaz Gelbord, who heads the OWASP Security Spending Benchmarks project, explains the survey results. Also, Ivan Arce of Core Security Technologies talks about smartphone threats and penetration testing.


March 23, 2009  4:53 PM

‘Hot Type’: The Truth about Identity Theft



Posted by: Jessica Scarpati
Hot Type: Security Books in Audio, Uncategorized

In the latest edition of “Hot Type: Security Books in Audio,” author Jim Stickley reveals just how easy it is for a cybercriminal to get access to your employees’ passwords.

And don’t forget to read an excerpt from Jim Stickley’s book: The Truth about Identity Theft.


March 18, 2009  2:23 PM

Security incident response tips; L0phtCrack is back



Posted by: Jessica Scarpati
Security Wire Weekly

Security expert Lenny Zeltser gives tips on how to appropriately respond to a security incident. Also, a discussion on the relaunch of L0phtCrack password cracking tool with Chris Wysopal of Veracode.

L0phtCrack release interview with Chris Wysopal. (video)


March 12, 2009  9:39 AM

Jose Nazario on botnets, cyberwarfare



Posted by: Jessica Scarpati
Security Wire Weekly

(SOURCE Boston 2009) Botnets are being used more frequently to silence political dissenters, explains Jose Nazario of Arbor Networks. Nazario has been studying the rise of botnets as a tool used in cyberwarfare.


March 6, 2009  10:04 AM

How to use (almost) free tools to find sensitive data



Posted by: Jessica Scarpati
Threat Monitor

No matter how much security awareness training employees get, some of them will still store sensitive data in insecure places. As a security manager, finding that data becomes of paramount importance — but how to do it? In this tip, John Soltys offers advice on ways to find insecurely stored data.


March 4, 2009  5:47 PM

PCI officials on data breaches, PCI DSS



Posted by: Jessica Scarpati
Security Wire Weekly

PCI Council general manager Bob Russo and Council chairman Lib de Veyra talk about the PCI Council’s goals in 2009. Russo is frank about the latest data breaches. Also a discussion about virtualization security with Steve Herrod of VMware.


February 25, 2009  11:10 PM

Attacks against SSL



Posted by: Jessica Scarpati
Security Wire Weekly

Cryptography expert Taher Elgamal of Axway Inc. defends SSL in the wake of research that bypasses it. Elgamal’s research led to the development of SSL.


February 23, 2009  3:56 PM

How to block adult websites from enterprise users by logging content



Posted by: Jessica Scarpati
Threat Monitor

Inappropriate content has always been a problem for enterprise security teams. What are some best practices for blocking adult content and websites from systems? In this security management tip, learn strategies for keeping users’ Web habits in check.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: