The UltraTech Zone

Integrating Life, Technology and Business with Andrew S. Baker...
Welcome to The UltraTech Zone Sign in | Join | Help
in
Home My Blog Forums Photos Resume Reading List External News Knowledgebase Consulting Mailing Lists Other Links

Browse by Tags

All Tags » Security » Malware   (RSS)
  • Reading Between the Lines of Breach Notifications

    Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance of How & When Sadly, to many organizations are doing something entirely different when it comes to post-breach notifications. I like to take ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on January 18, 2013
  • Get Real with Information Security

    In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased number of attacks. Not incidentally, mobile devices just flew off the shelves this year, with predictions that over 122 million tablets and some 717 million smartphones will have ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on December 31, 2012
  • Lessons from 2009: Functionality still trumps Security

    Yes, you heard me correctly… We still think about personal and corporate security only as an afterthought. Despite all the regulatory and industry compliance that has been created and updated in the past 15 years, as we close out this decade, we are hardly any closer to proactively applying security guidelines in our personal or professional ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on December 31, 2009
  • Searching for Return on Security Investments

    There are several major challenges to the successful implementation of good information security in many organizations today.  It is not because business owners do not think that security is important.  No, the issues exist because they do not grasp the complexities that embody the Information Security profession, and thus make decisions ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on October 30, 2009
  • We’re Back In The Worm Zone

    The Conficker worm continues to make headlines, not only because it has been so elusive over the past 5 or so months, but because it is configured to do something special on April 1, 2009.  For a disturbingly large number of individuals and organizations, it could prove to be a not-so-happy day. You can read up on the anticipated April 1 ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on March 30, 2009
  • Yes, Security Is Still Important in 2009

    Quite frankly, it’s even more important than it has been in the past.   This morning, I was reading some articles on information security, including news about the Conficker worm.  You know, we haven’t had a really good worm in 3 or 4 years, so it seems that people have forgotten about how dangerous those things can be, and how ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on February 13, 2009
  • Don't Drop the Ball on Security

    On a number of fronts, April 2007 is turning out to be a very interesting month for me.  For this particular post, we'll just touch on Information Security again. A recent report from MessageLabs indicates very clearly that targeted security attacks are on the rise, and that email is still a common threat vector.  This morning, I ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on April 18, 2007
  • SANS sees upsurge in zero-day Web-based attacks

    It's pretty much official now (in case you didn't believe it before):  We have exited the Worm era, and jumped head first into the era of specialized and targeted attacks... According to a recent article by ComputerWorld, SANS security organization sees upsurge in zero-day Web-based attacks. The following excerpt from the ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on December 12, 2006
  • More Malware, More SPAM

    According to some reports, spyware is getting harder and harder to control.  The sophistication of the malware makers is growing at a much faster pace than that of the security industry, even to the point of proof-of-concept adware code being developed for MacOS X. And with all this new malware comes a tremendous increase in SPAM over ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on November 28, 2006
  • Backdoor Trojans, Rootkits and SPAM: Notes from the Microsoft Antimalware Team

    The Microsoft AntiMalware team has recently published a paper discussing some of the data collected by their monthly AntiMalware tool. A summary of the article is available on the SANS website, and the full article is available from Microsoft at the following link: Windows Malicious Software Removal Tool: Progress Made, Trends ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on November 27, 2006
  • Virtual Machine Detection in Malware via Commercial Tools

    More About Sophisticated Malware http://isc.sans.org/diary.php?storyid=1871 Virtual machine detection is a self-defensive property of many malware specimens. It is aimed at making it harder to examine the malicious program, because virtualization software, such as VMware, is a very popular tool among malware analysts. For instance, ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on November 21, 2006
  • Growing Malware Sophistication

    The level of sophistication of the malware threats we face is continuing to grow at a much faster rate that the methods that most organizations are using to detect and mitigate them.  And let's not talk about home users. We need to ensure that we keep up to date on the latest threats, and that we also constantly evaluate our environments ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on October 23, 2006
  • The Fearful State of Malware Today

    Simply stated, it's really getting out of hand. A number of recent articles in the technology press make it increasing clear that the following themes are true as it pertains to malware today: We are increasingly falling behind on detection and mitigation of malware. The motivation for malware has moved from hobbyists to organized crime. ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on October 19, 2006
Powered by Community Server (Personal Edition), by Telligent Systems