Wireless network infrastructure – for anyone in business, it’s a necessary evil and, perhaps ironically, one that isn’t short on infrastructure. You need a controller and wireless routers or access points – lots of them – enabling wireless networks to join an existing wired network. You’ll have to invest in a site planner/survey tool, or risk incorrectly guessing where the APs should go
Patch Tuesday On the Way!
Another Patch Tuesday is upon us, and both Microsoft and Adobe have important patches that you should implement right away if you’re impacted. Adobe’s big patch fixes a ColdFusion exploit that allows an attacker to access files located on a server with ColdFusion installed.
1,000 malicious Android samples per day
“Is mobile malware really an issue?” is probably among the most frequent questions my friends ask me regarding my work. I usually like to answer indirectly with a graph as below: Figure 1. Evolution of malicious Android samples.
Microsoft Releases IE8 Fix-It Patch
Are you using Internet Explorer 8? If so, you need to read on
M2M Attracts Enterprises, Risks and All
Machine-to-machine (M2M) communications applications are working their way beyond traditional utility, traffic control and telemedicine industries, as enterprises search for ways it can benefit their businesses despite some real risks.
Tragic Spam
Whenever something awful happens in the world, both the good and the bad come to the surface: bad guys doing bad things like we saw in Boston last week, and good guys rushing to random people’s aid in the wake of the explosions.
APTs: One Layer Is Not Enough
One in five security professionals recently surveyed by ISACA say its organization has experienced an advanced persistent threat (APT) attack.
W32/Kryptik.AX!tr – A Masterful FTP Trojan
A few days ago I received an interesting email message: Just your typical phishing email. Normally, I would just dump it into our signature automation processors and move on to the next piece of malicious code.
Bitcoin and the ZeroAccess Botnet
Botnets for years have been leveraged as a cybercrime tool to commit any variety of nefarious activity ranging from Website defacement and DDoS to the proliferation of malware and theft of sensitive information. Lately, the cyber community can add one more to the list mining the digital currency Bitcoin.
Android malware gets phish-y
Last week the security world was abuzz with news of a new attack vector for mobile attacks.