The only proven strategy to thwart CryptoLocker ransomware

Emerging Information Security Threats

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Economy fuels malware, spam

    Dave Marcus of McAfee's Avert Labs, breaks down the threat landscape and explains why spam numbers are rising and malware writers are taking advantage of the down economy. 

  • Jose Nazario on botnets, cyberwarfare

    SOURCE Boston 2009: Botnets are being used to silence political dissenters, explains Jose Nazario of Arbor Networks. DDoS attacks are a growing part of cyberwarfare. 

  • Black Hat DC 2009: Keynote excerpt – Paul Kurtz, former White House advisor

    Former White House advisor Paul Kurtz, said representatives from the public and private sector need to coordinate who should direct a national response to a cyberattack. 

  • Black Hat DC 2009: Joanna Rutkowska on Intel TXT flaws

    In this session excerpt, researcher Joanna Rutkowska explains flaws discovered in current Intel Trusted Execution Technology (TXT) implementations and how they can be exploited. 

  • Virtualization: Disruptive technologies part 1

    Virtualization promises enterprises amazing cost-saving benefits, but what about the inherent security threats? In part one of this panel, Chris Hoff, Rich Mogull and Dino Dai Zovi discuss the greatest threats to virtualized environments, including s... 

  • How to defend against data-pilfering attacks

    In this video from Information Security Decisions 2008, Mandiant's Kevin Mandia details data-pilfering attacks and the four ways hackers can penetrate a network. 

  • Cyberattacks and extortion

    Mandiant's Kevin Mandia assesses the state of cybercrime, which includes an increase in extortion, SQL injections and targeted email attacks. 

  • Inside a retail hack

    Mandia's Kevin Mandiant offers a post-mortem case study on a recent retail bank hack involving SQL injection. 

  • Information security podcasts: 2008 archive

    Listen to all of's 2008 security podcasts, which include the year's best IT news and interviews. 

  • Dan Kaminsky on DNS, Web attacks

    Noted network security researcher Dan Kaminsky, director of penetration testing at IOActive, shares his research on DNS and Web-based attack techniques.