- Malvertisements: Mitigating malicious advertisement malwareTip - Expert Michael Cobb explains why malvertisements are so hard to control and what enterprises can do to help mitigate the risk of malicious advertisement malware.
- Evolving IT security threats: Inside Web-based, social engineering attacksTip - Attackers have mixed a dangerous cocktail of social engineering, Web-based attacks and persistence. Lenny Zeltser explains how your organization can keep from drowning in malware.
- Data breaches, spear phishing and application defensePodcast - Bit9 CTO Harry Sverdlove, the former principal research scientist at McAfee Inc., talks about the latest spate of data breaches and the lessons that can be gleaned from them.
Malware, virus, Trojan and spyware protection and removal from searchSecurity.com
Opinion -A ransomware attack is not your typical data loss event. Some data protection vendors get the picture and are incorporating ransomware-specific features in their products.
essential_guide -The key to countering cyberthreats today is to first understand your biggest vulnerabilities and then research the most effective countermeasures available to minimize them.
Definition -A zero-day vulnerability, also known as a computer zero day, is a flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw.