Defense

21st century defense-In-depth involves more than 2 AVs

If one AV is good, are two AVs better defense against APTs, ransomware and other sophisticated malware? That's the way we used to do it back in the '80s and '90s, but does this approach still work?

New phishing tactic: Infect sites and wait for catch

By

Researchers believe watering hole strategies, where attackers compromise sites visited by their targets, are used to steal personal information and set the stage for spear phishing attacks.

Black Hat hacker con promises to "ruffle some feathers"

By

The chairs of the five conference tracks taking place later this month at the Black Hat show in Las Vegas took some time Thursday to discuss some of the more riveting sessions that are planned.

Lockheed Martin hit, but not breached, with Adobe zero-day

By

Defense contractors appear to be the prime target of sophisticated malware that attempts to take advantage of an unpatched flaw in Adobe Reader and Acrobat software.

New cybersecurity alliance launches in Massachusetts

By

The Advanced Cyber Security Center will partner businesses and research universities to share threat information and develop more effective defense strategies.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US