it

Do you know your enemy?

The state of Information Security

Malware authors have figured out how to evade AV by continually tweaking their binaries. They can circumvent content filtering systems by hacking legitimate sites (banner ads, etc.) that users are allowed to access. They flow right by IDPS and Malware Detection Systems through the same type of techniques. Firewalls offer good protection for inbound connection attempts, though the threat vector now consists of an attacker riding back in on legitimate outbound connections.

 

Eugene Kaspersky Presents "The threats of the Age of cyber-warfare"

Eugene Kaspersky presents on the cyber crime landscape and the threats of the age of cyber-warfare during Kaspersky Lab's Cyber Security Symposium and Global Corporate Product Launch.

Microsoft Responds to Critics Over Botnet Bruhaha

Cyber attacks on European IT systems would become a criminal offence

 

Cyberwarfare: Cyber Attack Brings Down Key Palestinian Website

Officials say cyber attacks have shut down the websites of the two main Palestinian news agencies

GCHQ CanYouCrackIt Solution explained step by step with videos

Improving the IT & Security Industry – A Top-Down Effort

 The ever ongoing debate about quality IT staff once again received a nudge, this time by an

Bruce Schneier on Cyber War and Cyber Crime