Sheldon Malm and Josh Abraham of Rapid7 explain some of the serious vulnerabilities addressed by Microsoft this month. Also, Eric Voskuil of BeyondTrust on ways to protect against ActiveX vulnerabilities. Microsoft has been dealing with a slew of ActiveX flaws of late.
Jack Walsh, network IPS program manager for ICSA Labs discusses the latest Microsoft zero-day and his firm’s research into the attack methods. Read the full story.
Rogue DHCP server malware is a new twist on an old concept. The good news is that effective threat mitigation strategies exist; the bad news is that many organizations haven’t bothered to deploy them.
Like it or not Web-based social networking services are here to stay. Amit Klein, founder and chief technology officer of Trusteer talks about the latest Twitter threats, how browser makers are responding to phishing and other attacks and the adoption of DNSSEC.
Security researcher Matt Wood of HP talks about a new browser-based darknet he co-developed called Veiled. Also, Pete Lindstrom of Spire Security on TJX’s latest data breach news.
Most security pros don’t give the system BIOS a second thought, or even a first one, but today’s BIOS types are highly susceptible to malicious hackers. Information security threats expert Sherri Davidoff explains how attackers can plant BIOS malware and how security pros can thwart such attacks.
Is the recession holding back your career plans? In this free 30-minute podcast, experts Lee Kushner and Mike Murray offer infosec job advice that will help you survive and thrive in tough times.
Click fraud is threatening online advertising, according to experts. This week, Anchor Intelligence lead scientist Daniel Walling and Richard Sim, vice president of product management talk about how fraudsters are getting more sophisticated. Also Jeremiah Grossman of WhiteHat Security explains why it’s so easy for people to carry out click fraud.
SearchSecurity.com editors discuss the Obama administration’s cybersecurity plans, the FTC shutdown of Triple Fiber Network and what IT security pros can do to address the growing threat posed by the use of social networks and other Web-based services.
Security consultant Lenny Zeltser of Savvis Security Consulting Services explains the threats posed by employee use of social networking websites and what security pros can do to address them. Zeltser is a faculty member at the SANS Institute. Also, a brief overview of Microsoft Patch Tuesday.