Ask The Security Expert: Questions & Answers

Expert Archive: Information Security Threats

Ed Skoudis, Contributor

Check out past Q&As with former SearchSecurity.com expert Ed Skoudis.

Ed Skoudis, Contributor

Display in sets of:
  • What are the risks associated with RIM's line of PDAs?

    Ask the Expert - PDAs are everywhere. What are the biggest risks and the best ways to keep them secure? Security threats expert Ed Skoudis weighs in. 17 March 2008
  • Can 'herd intelligence' effectively stop malware?

    Ask the Expert - 'Herd intelligence' provides a distributed sensor net, finding new specimens that are potentially evil. Information security threat expert Ed Skoudis explains how effective the antimalware technology really is. 11 February 2008
  • Is there a market for standalone antivirus products?

    Ask the Expert - In this SearchSecurity.com Q&A, Ed Skoudis says that there is still a market opportunity for standalone antivirus products -- but the window is shrinking. 11 February 2008
  • What security measures can be taken to stop crimeware kits?

    Ask the Expert - Enterprises that don't have thoroughly patched browsers, PDF readers, media players and other client-side software are very likely to get compromised by MPack and similar crimeware tools. Ed Skoudis explains. 11 February 2008
  • What software development practices prevent input validation attacks?

    Ask the Expert - Improper input validation leads to numerous kinds of attacks, including cross-site scripting, SQL injection and command injection. In this expert Q&A, Michael Cobb reviews the most important application development practices. 11 February 2008
  • How should application developers manage cookies?

    Ask the Expert - Cookies hold data, such as user preferences and session tracking credentials. In this expert Q&A, Ed Skoudis explains how application developers can define and manage the cookies appropriately. 11 February 2008
  • What is the safest way to handle quarantined adware?

    Ask the Expert - A computer's adware has been quarantined. Now what? Expert Ed Skoudis explains the safest way to dispose of unwanted adware. 07 February 2008
  • How effective are phishing links that refer to FTP sites?

    Ask the Expert - The vast majority of phishing emails still include HTTP links, but there has been a recent smattering that refer to FTP sites. In this SearchSecurity.com Q&A, Ed Skoudis explains how to be ready for the malicious messages. 04 January 2008
  • Does Teredo present security risks to the enterprise?

    Ask the Expert - Teredo allows internal networks to transition to IPv6, interconnecting them through their NAT devices and across the IPv4 Internet. Ed Skoudis explains why this function isn't as innocent as it seems. 04 January 2008
  • Should a Java Runtime Environment (JRE) be kept up to date?

    Ask the Expert - Critical security flaws are often discovered in Java Runtime Environment implementations. Unfortunately, most users don't apply any appropriate patches. Ed Skoudis reveals the security risks posed by a vulnerable JRE. 04 January 2008