The only proven strategy to thwart CryptoLocker ransomware

Emerging Information Security Threats

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Smartphone security: The growing threat of mobile malware

    The increasingly pervasive use of wireless handhelds in the enterprise is just one reason why malware pros are getting serious about mobile malware. Lisa Phifer details all the reasons why smartphone and PDA viruses and malware may be on the rise, an... 

  • Weaponizing Kaminsky's DNS discovery

    The dust has settled since Dan Kaminsky revealed an intriguing -- and now, perhaps, notorious -- DNS exploit at this year's Black Hat briefings. But many organizations are still not patching their internal servers. John Strand explains why this negli... 

  • How to patch Kaminsky's DNS vulnerability

    When Dan Kaminsky revealed the details of his recently discovered DNS flaw at this year's Black Hat briefings, it confirmed what many in the security community already feared: that it was one of the most important discoveries in years, and that enter... 

  • Ransomware: How to deal with advanced encryption algorithms

    It's late in the day, and your CEO reports a strange message on his computer screen: his files have been encrypted, and a payment is required to return all of his data. What do you do? Don't give in to the cyberterrorists just yet. Mike Chapple expla... 

  • DNS rebinding defenses still necessary, thanks to Web 2.0

    The scripted content and plug-ins of today's Web 2.0 websites have opened enterprise networks to an old threat: DNS rebinding. The attacks can create serious problems for your enterprise network, but the defenses are easier than you think. Security C... 

  • Hidden endpoints: Mitigating the threat of non-traditional network devices

    Organizations have many safeguards in place for network-enabled devices like PCs and servers, but few realize the threat posed by non-traditional devices like printers, physical access devices and even vending machines. Endpoint security expert Mark ... 

  • Stopping malware in its tracks

    There's no such thing as a cure-all for stopping malware. Effective malware defense demands a keen attention to detail and careful planning. Expert Lenny Zeltser offers a malware-defense blueprint every enterprise can follow, plus plenty of free tool... 

  • Social networking website threats manageable with good enterprise policy

    Social networking sites may worry employers because of privacy concerns or loss of productivity, but some of the sites -- unbeknownst to their owners or creators -- harbor dangerous malware that can take down a network. Michael Cobb reviews the risks... 

  • Enterprise security in 2008: Malware trends suggest new twists on old tricks

    This year's malicious hackers are ready to add new twists to their old tricks. Taking hints from last year's range of cyber attacks and malicious code, information security expert Ed Skoudis reveals five key threats that are likely to dominate headli... 

  • Thinking fast-flux: New bait for advanced phishing tactics

    Bot herders haven't made millions of dollars by relying on yesterday's botnet techniques. In fact, the bad guys have found an innovative new way to leverage thousands of drone machines; it's called fast flux, and it makes even the largest botnets muc...