Tags » Malware

Webinar Review: How to Stop Malware and Advanced Persistent Threats

25 October 2014

Last Thursday evening I attended the SC Magazine eSymposium: Advanced persistent threats. You have to register with SC Magazine to get access to the sessions. 276 more words

Survival Tips

5 Virginia police agencies stockpile private phone records

Update: ACLU wants information on phone database network

The American Civil Liberties Union of Virginia has sent a Freedom of Information Act request to Hampton, Newport News, Suffolk, Chesapeake and Norfolk for information on the Hampton Roads Telephone Analysis Share Network, a database formed two years ago to help police scour personal telephone data for potential criminal activity.

166 more words

Compliancy vs. Security

The difference between Compliancy and Security could be less clear than one would expect. This is very understandable, because some Compliancy Certifications are all about Security. 736 more words


Ransomware Virus Alert

Another report just out from United States Computer Emergency Readiness Team (US- CERT) regarding crypto ransomware malware that affects all Windows PC’s.

National Cyber Awareness System: 1,045 more words

Just Good Business Information

Has the "Sandworm" zero-day exploit burrowed back to the surface?

You’ve probably heard of Sandworm.

That’s the somewhat sneakily misnamed vulnerability (it’s not actually a worm) that made headlines mid-way through October 2014.

Technically, Sandworm was a zero-day, because it was apparently seen in a real-world targeted attack before it was fixed by Microsoft. 671 more words


Worm variant of Android ransomware, Koler, spreads via SMS

In May, researchers observed Android ransomware identified as Koler.A locking up the screens of victims around the world who visited certain pornographic websites – now, mobile security company AdaptiveMobile has discovered a worm variant that is spreading through SMS.

12 more words
Digital Information Law