- Malvertisements: Mitigating malicious advertisement malwareTip - Expert Michael Cobb explains why malvertisements are so hard to control and what enterprises can do to help mitigate the risk of malicious advertisement malware.
- Evolving IT security threats: Inside Web-based, social engineering attacksTip - Attackers have mixed a dangerous cocktail of social engineering, Web-based attacks and persistence. Lenny Zeltser explains how your organization can keep from drowning in malware.
- Data breaches, spear phishing and application defensePodcast - Bit9 CTO Harry Sverdlove, the former principal research scientist at McAfee Inc., talks about the latest spate of data breaches and the lessons that can be gleaned from them.
Malware, Viruses, Trojans and Spyware from searchSecurity.com
Definition -Command and control servers (C&C servers) are computers that issue commands to members of a botnet. Botnet members may be referred to a zombies and the botnet itself may be referred to as a zombie army.
Definition -An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware.
Definition -An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, institution, or agency. The term can also apply to an outside person who poses as an employee or officer by obtaining false credentials.