-
Does the Bit9 compromise call application whitelisting into question?
Expert Nick Lewis explains how Bit9 was recently compromised and the viability of application whitelisting as a result of the compromise.31 Jul 2013
-
To improve breach detection, revisit intrusion detection techniques
To solve the breach-detection issues highlighted in the 2013 Verizon DBIR, several intrusion detection techniques are needed, says expert Nick Lewis.31 Jul 2013
-
New advanced persistent threat protection: Beyond perimeter defense
Firewalls and antivirus are ineffective in the face of APT attacks. Expert Nick Lewis offers suggestions for advanced persistent threat protection.30 Jul 2013
-
How a DNS reflection attack differs from a standard DoS attack program
A DNS reflection attack is like a regular denial-of-service attack, but much worse. Nick Lewis explains why.29 Jul 2013
-
Inside the Samsung Galaxy Note 2 lock screen bypass vulnerability
Expert Nick Lewis explains how attackers bypassed the Samsung Galaxy Note 2 lock screen and which devices may be vulnerable.29 Jul 2013
-
How an Adobe Reader zero-day exploit escapes sandboxing capabilities
Expert Nick Lewis explains how a recent zero-day exploit escaped the Adobe Reader sandbox, and whether it's likely to happen again.29 Jul 2013
-
Disable autorun to prevent autorun malware infections
Expert Nick Lewis explains how disabling autorun prevents malware from affecting users.26 Jul 2013
-
Feds catch hackers behind worldwide data breaches
Feds indict, unmask hackers behind largest known data breach conspiracy targeting worldwide financial institutes, payment processors and retailers.26 Jul 2013
-
Armitage tutorial: How to use Armitage for vulnerability assessments
Video: In this Armitage tutorial, Keith Barker of CBT Nuggets shows how to use the Metasploit add-on to perform vulnerability assessments.26 Jul 2013
-
How to protect data from ransomware malware
It can be difficult to recover data that is encrypted by ransomware malware -- unless you have expert Nick Lewis' recommendations in place.25 Jul 2013
-
CASP certification: Does CompTIA's security certification offer value?
The new CompTIA Advanced Security Practitioner certification won't replace the CISSP, but it may offer critical value to one specific group.25 Jul 2013
-
RSA warns about 'KINS' banking Trojan
RSA is warning that a new banking Trojan, 'KINS,' with architectural similarities to previous Trojans, may start hitting PCs soon.24 Jul 2013
-
Cisco spends cool $2.7 billion in Sourcefire acquisition
In biggest security acquisition since 2011, Cisco has announced it will buy IDS maker Sourcefire for $2.7 billion.24 Jul 2013
-
Cyberthreat landscape plagued by automated attacks, Gartner says
Gartner VP Richard Hunter reviews the enterprise cyberthreat landscape and explains why automated attacks will only make a bad situation worse.24 Jul 2013
-
How to detect malware with changing file sizes
Malware authors change the size of malware files to avoid detection by antivirus software. Learn how to detect this malware from expert Nick Lewis.24 Jul 2013
-
Podcast: Gartner VP details enterprise cyberthreats
Gartner VP Richard Hunter reviews the enterprise cyberthreat landscape and explains why automated attacks will only make a bad situation worse.24 Jul 2013
-
Foxit Reader vulnerability: Time to find an alternative PDF reader?
Does the latest Foxit Reader vulnerability mean it's time to find an alternative PDF reader? Expert Nick Lewis offers his advice.23 Jul 2013
-
Mega-DDoS attack prevention: How to prepare for larger DDoS attacks
Enterprises face increasing risks from mega-DDoS attacks. Expert Brad Casey provides advice on high-bandwidth DDoS attack prevention.23 Jul 2013
-
Turkish researcher claims responsibility for Apple dev site hack
Turkish researcher Ibrahim Balic says he found multiple vulnerabilities at Apple's developer website, but did not intend to bring the site down.22 Jul 2013
-
How to avoid security problems with Java outside the browser
Another Java zero-day vulnerability has a security pro asking threats expert Nick Lewis how Java can safely be used with enterprise applications.22 Jul 2013
Security Management Strategies for the CIO