Email Alerts
-
What are the risks of logging into a botnet control channel?
By sniffing traffic as an infected machine logs into a botnet, it may possible to see an attacker's commands. Using that information to interact with the botnet, however, is dangerous, says information security threat expert Ed Skoudis. Ask the Expert
-
Is the Storm worm virus still a serious threat?
Today, attackers continue to have success with the Storm worm and its many variations, using the malware to strengthen their nasty botnets. In this SearchSecurity.com Q&A, expert Ed Skoudis explains why these rather run-of-the-mill attacks are still ... Ask the Expert
-
What is a logic bomb?
A logic bomb is a dangerous piece of software designed to damage a computer or network and cause massive data destruction. In this SearchSecurity.com Q&A, Ed Skoudis explains how an enterprise can prepare for a hacker's detonation. Ask the Expert
-
Who's fighting the spyware operators?
There are plenty of malicious hackers who use spyware to gather others' personal data, so why aren't these cybercriminals behind bars? In this SearchSecurity.com Q&A, Ed Skoudis explains some of the challenges facing law enforcement. Ask the Expert
-
Can smurf attacks cause more than just a denial of service?
Smurf attacks are one of the oldest denial-of-service tricks in a hacker's book. In this SearchSecurity.com Q&A, expert Mike Chapple explains whether such an attacks can do more than just slow your network down. Ask the Expert
-
Categorizing malware
Ask the Expert
-
Tracking down virus distributors for civil litigation
Ask the Expert
-
Fighting back against virus writers
Ask the Expert
-
Categorizing hacker tools
Ask the Expert
Security Management Strategies for the CIO