Email Alerts
-
QR codes security: Do malicious QR codes pose a risk?
Expert Nick Lewis discusses QR codes security and whether malicious QR codes pose enough risk to justify disabling them. Answer
-
Curb the spam virus threat via information security awareness training
Information security awareness training doesn't always protect users from the ongoing spam virus threat. Nick Lewis offers additional measures that may help. Answer
-
Does Morto worm prove inherent flaws in Windows RDP security?
The recent Morto worm had unusual success spreading via Windows Remote Desktop Protocol. Does that mean RDP is security too weak? Nick Lewis explains. Answer
-
Zeus Trojan analysis: How to decode the Zeus config.bin file
Learn how to analyze the Zeus config.bin file in order to identify targeted URLs and infected computers on your network. Answer
-
SSL alternatives? Crafting Web-security programs for emerging threats
Expert Nick Lewis reacts to breaches at SSL certificate issuers and tackles whether enterprises should turn to SSL alternatives. Answer
-
Zero-day attack protection for Microsoft Graphics Rendering Engine
How vulnerable is the Windows Graphics Rendering Engine, and how should companies address recent zero-day attacks? Learn more in this expert response. Answer
-
MHTML security for Internet Explorer: Worth disabling MHTML IE?
Threats expert Nick Lewis discusses a recent vulnerability in MHTML security, and whether disabling the MHTML IE function is the best defense tactic. Answer
-
Can rootkit detection mechanisms stop the Blue Pill?
At Black Hat 2006, researcher Joanna Rutkowska unveiled a piece of machine-based malware called the Blue Pill. But is it a serious threat to your operating system? Ed Skoudis explains in this expert Q&A. Ask the Expert
-
Smishing: How to protect enterprises from SMS fraud
Learn more about protecting enterprises from smishing, or SMS fraud, in this expert response from Nick Lewis. Ask the Expert
-
Computer hijacking: Protecting against the Microsoft DLL download flaw
If exploited, the Microsoft DLL load-hijacking flaw could allow attackers to execute arbitrary code on machines. In this expert response, Nick Lewis explains how to protect against this vulnerability. Ask the Expert
Security Management Strategies for the CIO