- Malvertisements: Mitigating malicious advertisement malwareTip - Expert Michael Cobb explains why malvertisements are so hard to control and what enterprises can do to help mitigate the risk of malicious advertisement malware.
- Evolving IT security threats: Inside Web-based, social engineering attacksTip - Attackers have mixed a dangerous cocktail of social engineering, Web-based attacks and persistence. Lenny Zeltser explains how your organization can keep from drowning in malware.
- Data breaches, spear phishing and application defensePodcast - Bit9 CTO Harry Sverdlove, the former principal research scientist at McAfee Inc., talks about the latest spate of data breaches and the lessons that can be gleaned from them.
Malware, Viruses, Trojans and Spyware from searchSecurity.com
E-Zine -The era of the Internet of Things, bring your own devices and social media has also become an era of highly sophisticated malware. Advanced security monitoring tools are crucial in the fight to protect the enterprise network.
This Insider Edition of Information Security offers the latest on these tools and how IT pros can best benefit from them. First, we review their newest capabilities, which include the ability to collect and scour immense amounts of data; some tools also have a capacity for learning. Next we talk to network security pros on the frontline, and how they are employing security monitoring tools. Finally, we examine the endpoint protection market, which was jolted back to life by demands for new levels of network protection in an era of smartphones and smartwatches.
This issue provides network and security IT pros with step-by-step guidance so they can decide what advanced security monitoring tools are right for their network’s particular needs.
News -Drive-by financial malware Fobber is the evolution of the popular Tinba -- with better encryption, a newer format and a focus on the Netherlands.
Answer -Enterprise threats expert Nick Lewis explains the difference between extortionware and ransomware in terms of what they are and how to defend against them.