Attackers are increasingly spreading their malicious code through fly-by-night websites that seem legitimate to unsuspecting users, but are actually laden with malware. Marcos Christodonte II explains how short-lived Web malware works, and how enterprises can use Web filtering, honeytokens and good policy to mitigate the threat.
We talk about the hype surrounding the Conficker worm with Pete Lindstrom, research director at Spire Security. Also, Dave Marcus of McAfee joins us to talk about malware in a down economy.
Boaz Gelbord, who heads the OWASP Security Spending Benchmarks project, explains the survey results. Also, Ivan Arce of Core Security Technologies talks about smartphone threats and penetration testing.
In the latest edition of “Hot Type: Security Books in Audio,” author Jim Stickley reveals just how easy it is for a cybercriminal to get access to your employees’ passwords.
And don’t forget to read an excerpt from Jim Stickley’s book: The Truth about Identity Theft.
Security expert Lenny Zeltser gives tips on how to appropriately respond to a security incident. Also, a discussion on the relaunch of L0phtCrack password cracking tool with Chris Wysopal of Veracode.
(SOURCE Boston 2009) Botnets are being used more frequently to silence political dissenters, explains Jose Nazario of Arbor Networks. Nazario has been studying the rise of botnets as a tool used in cyberwarfare.
No matter how much security awareness training employees get, some of them will still store sensitive data in insecure places. As a security manager, finding that data becomes of paramount importance — but how to do it? In this tip, John Soltys offers advice on ways to find insecurely stored data.
PCI Council general manager Bob Russo and Council chairman Lib de Veyra talk about the PCI Council’s goals in 2009. Russo is frank about the latest data breaches. Also a discussion about virtualization security with Steve Herrod of VMware.
Cryptography expert Taher Elgamal of Axway Inc. defends SSL in the wake of research that bypasses it. Elgamal’s research led to the development of SSL.
Inappropriate content has always been a problem for enterprise security teams. What are some best practices for blocking adult content and websites from systems? In this security management tip, learn strategies for keeping users’ Web habits in check.