Website Files Ransomed – Not Just Personal Files
This image explains (from PCWorld Article) The Ransomware image that can occupy your computer if you had the misfortune of downloading the wrong item (malware – virus, etc). Or if…
Defend Your Systems
This image explains (from PCWorld Article) The Ransomware image that can occupy your computer if you had the misfortune of downloading the wrong item (malware – virus, etc). Or if…
SecTor presentation by Kristin Lovejoy at http://2015.video.sector.ca/video/144598380 There are several business disrupters: The Cloud is changing how software is developed and thus how security should look at the cloud Agile…
It is an interesting document from the stateoftheinternet.com https://www.stateoftheinternet.com/downloads/pdfs/SpamBot-Investigation-whitepaper-R3.pdf This botnet had 83,000 unique infections (which include webservers running all operating systems) And on page 6 where the researchers revealed…
Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, and Sharon Goldberg wrote a paper (out of Boston University) http://www.cs.bu.edu/~goldbe/papers/NTPattack.pdf “Attacking the Networking Time Protocol” Apparently if your servers and clients (which…
After seeing a good ISACA presentation today at the Renaissance in Saint Louis (near airport) http://www.isaca.org/chapters5/Saint-Louis/Pages/default.aspx by Josh Vander Veen with SpearTip Here are my notes: Sophistication of criminal attack…