The only proven strategy to thwart CryptoLocker ransomware

Emerging Information Security Threats

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Will fixed-mobile convergence (FMC) create more security risks?

    Many carriers want to deliver data and video by integrating wireline and wireless infrastructures, a move called fixed-mobile convergence (FMC). In this tip, Ed Skoudis explains. the security implications of such a combination. 

  • How vulnerable are network printers?

    Security personnel often don't give network printers much attention; after all, they are "only printers." In this Q&A, Ed Skoudis explains why such devices are, in fact, a juicy target and need to be properly patched and hardened.... 

  • Will the botnet threat continue?

    Is the botnet threat here to stay? In this Q&A, information security threat expert Ed Skoudis explains how these money-making machines will become a greater threat in 2007. 

  • How can attackers exploit RSS software flaws?

    RSS syndication feeds are a convenient way to get your news, blogs or other favorite content, but these popular tools are often left exposed. In this Q&A, Ed Skoudis explains how malicious hackers can attack RSS software and distri... 

  • What are the risks of social networking sites?

    Social networking sites allow someone to post information that thousands of other users can read. But that's not at all. In this Q&A, information security threats expert Ed Skoudis reveals how sites like Myspace and Youtube let the bad guys post some... 

  • What tools can remove rookits or prevent their installation?

    Once installed, rootkits can stealthily monitor your traffic and keystrokes. In this Q&A, information security threats expert Ed Skoudis offers four ways to keep the malware off of your systems in the first place. 

  • How well does virtualization technology defend against malware?

    Virtualization products can protect your host operating system from malware, but the their detection methods aren't foolproof. In this expert Q&A, information security threats expert Ed Skoudis explains how malware and its writers are catching on to ... 

  • Which security practices can lower exposure to zero-day attacks?

    It's never possible to completely prevent zero-day attacks, but in this Q&A, network security expert Mike Chapple reveals which tools can provide significant protection from such threats. 

  • Can simple antispam filters solve the image spam problem?

    If your company has a problem with image spam, why not just filter it out? In this Q&A, information security threat expert Ed Skoudis explains why filtering isn't the easy answer. 

  • What are the security risks associated with virtual PCs?

    Since Virtual PCs enable you to run multiple operating systems simultaneously on a single piece of hardware, they can introduce risks into your networking environment. In this information security threats Q&A, Ed Skoudis examines what these risks are...