Essential Guide

Endless variety: Dealing with advanced threats

"Advanced" is often code for "attacks we're not good at stopping." Some are incredibly complex, some just well-targeted. This guide tackles the gamut of hacker creativity, from "did the homework" to "blew the doors off."

Introduction

There have always been sophisticated hackers, just not all that many of them. Now there seem to be more than ever, and they have branched out in numerous directions to find different, novel avenues of attack. This Essential Guide takes on what's become a genuinely essential task: keeping up with each new class of attack as it's created. Here's a look at the threats to embedded systems, to the mobile device and app ecosystem, and to all manner of stealthy attacks on conventional systems that are harder than ever to detect before significant damage has been done.

1Trends-

Trends and detection

Even though attacks are becoming more sophisticated, sometimes involving teams of dozens of experts crafting inventive malware and other malicious tools, the pace of "innovation" doesn't seem to have slowed much, even with the added complexity. We've taken several looks at what elements in the cat-and-mouse game of threats are currently shifting the fastest.

Answer

Advanced threats? Move beyond perimeter defense

Firewalls and antivirus are ineffective in the face of APT attacks. Expert Nick Lewis offers suggestions for advanced persistent threat protection. Continue Reading

Tip

What do advanced malware detection products look like and what can they do for you?

Traditional security tools are no longer sufficient for defending against new breeds of attacks, forcing advanced threat-detection products to emerge. Continue Reading

Tip

SIEM's improved view means better detection of advanced threats

SIEM struggles are common, but Mike Rothman explains why SIEM products are critical for advanced attack detection, and offers a SIEM tuning step-by-step. Continue Reading

News

DoL attack is a case study in advanced attack trends

The IE8 zero-day attack planted in the U.S. Labor Department's website highlights how few organizations can ward off never-before-seen attacks. Continue Reading

Magazine

How to manage your threats

A successful threat management program requires effective processes, layered technology and user education. Continue Reading

2DNS, DDoS, and More-

Recent examples

Emerging threats, not surprisingly, make headline news. Or at least, they do when they finally are detected. Some of the newer threats of late have been noticeable from Day 1, of course, as they have focused on various approaches to denial of service (DoS). Of course distributed DoS isn't the only game in town, and we've seen, to take one example, very interesting twists on the traditional man-in-the-middle attack.

News

DDoS attacks are reaching tsunami proportions

Activists unleash a distributed denial-of-service (DDoS) attack in support of a web hosting firm, Cyberbunker, blacklisted by an anti-spam website Continue Reading

News

News on kinetic attacks from RSA 2013

At RSA 2013, experts Ed Skoudis and Johannes Ullrich explained how the SANS CyberCity supports offensive forensics and helps prevent kinetic attacks. Continue Reading

News

DDoS grows in size, but also in sophistication

Though the Spamhaus DDoS attack showed the potential devastation of increasing bandwidth, DDoS attack trends show DDoS type to be just as important. Continue Reading

Answer

Turning DNS reflection into a high-volume attack

A DNS reflection attack is like a regular denial-of-service attack, but much worse. Nick Lewis explains why. Continue Reading

News

IPv4 +IPv6 = Hack

Neohapsis' Scott Behrens explains how having both IPv4 and IPv6 Internet protocols enabled can lead to man-in-the-middle attacks. Continue Reading

3Locking Down-

Emerging defenses

As we become aware of new kinds of attacks, inventive minds turn their attention to mitigation. Here are some examples of what's brewing to help security professionals deal with mobile, DDoS and other attacks.

Tip

Defending against large-scale DDoS attacks

Enterprises face increasing risks from mega-DDoS attacks. Expert Brad Casey provides advice on high-bandwidth DDoS attack prevention. Continue Reading

News

Mobile devices and network intrusions

Mobile device attacks will rank among the top threats enterprises face in the coming months, serving as a pivot point for bigger network intrusions. Continue Reading

Tip

Defending yourself in a malware toolkit world

Expert Nick Lewis details how automated exploit kits are evolving and offers mitigations for the latest methods employed by these attack toolkits. Continue Reading

News

Malware toolkits: A veritable black hole

A new URL generation algorithm and domain obfuscation are among the new features designed to trip up malware analysis and avoid detection. Continue Reading

Feature

Where does big data fit when dealing with emerging threats?

Will big data analytics make security better? With data scientists in short supply, solution providers rush to provide big data analytics tools. Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close