The only proven strategy to thwart CryptoLocker ransomware

Emerging Information Security Threats

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to avoid dangling pointers: Tiny programming errors leave serious security vulnerabilities

    For years, many have said that there is no practical way to exploit a dangling pointer, a common application programming error. But these software bugs should no longer be thought of as simple quality-assurance problems. Michael Cobb explains how th... 

  • Fight viruses with your USB flash drive

    Information security pros often spend much of their days away from their desks. So when malware strikes -- in the form of a worm, virus or worse -- it can be helpful to have a USB thumb drive loaded up with valuable remediation tools at the ready. In... 

  • Building malware defenses: From rootkits to bootkits

    There's an evolving form of malware on the scene that can silently and maliciously wreak havoc on operating systems. Meet the "bootkit" -- a rootkit variant reminiscent of the old-school boot sector virus. While software exists for rootkit detection ... 

  • Dynamic code obfuscation: New threat requires innovative defenses

    Dynamic code obfuscation used to be a taxing effort, but now even the most junior-level malicious hackers have learned how to effectively hide their code. In this tip, Michael Cobb examines how dynamic code obfuscation works, why it's on the rise and... 

  • Eight top information security events of 2006

    From WMF exploits to the Veterans Affairs data breach, information security threats were plentiful in 2006. In this tip, contributor Joel Dubin reviews what grabbed the attention of hackers in the information security world in 2006 and explains how t... 

  • Using steganography for securing data, not concealing it

    Steganography is a useful technique for securely storing sensitive data, but the difficulty in detecting its usage can create an opportunity for digital miscreants. Michael Cobb explains how to ensure the practice isn't used maliciously. 

  • Google Code Search -- Finding security flaws has never been easier

    While Google Code Search may offer a number of benefits that will help improve application security, hackers have learned how to use the search giant's code-finding engine to exploit security weaknesses. In this tip, Ed Skoudis examines how malicious... 

  • RFID security issues endanger companies and consumers

    As the holiday season approaches, credit card purchases will undoubtedly increase. However, before waving your RFID-enabled credit card at the checkout of your favorite store, research suggests you may want to think twice. In this tip, Joel Dubin exa... 

  • Malware: The changing landscape

    Malware is arguably growing faster than ever before, but not in ways the industry has come to expect. Even though the days of the superworm might be numbered, contributor Mike Chapple says it's time for organizations to adapt their defense postures b... 

  • Does blogging pose enterprise information security risks?

    Blog popularity has continued to grow, now even reaching the corporate world as an effective communications and marketing tool. Blogs carry enterprise risks, however, and few companies are taking the proper precautions. Expert Mike Chapple raises pol...