SORT BY Relevancy
While conducting incident response work, Mandiant encounters security teams and executives who seem to focus on malware as the defining feature of a compromise. These groups think that the scope of an incident depends on knowing where the intruder installed malware. Knowing where malware was used, and how it was used, is indeed important for effective incident response. Unfortunately, knowledge of malware, however complete, is only half the picture.
Welcome to the Federal Blue Print podcast series. Using tools from Blue Coat’s comprehensive security portfolio and data gathered from over 75 million users around the world, the 2014 Mobile Malware Report provides a comprehensive overview of the state of malware and what we can do to mitigate its effects.
Today, we are speaking with Sasi Murthy, Senior Director, Product Marketing at Blue Coat Systems, who is going to share more insights into this report.
In this Lacoon Mobile Security Podcast series, Dan Koretsky, Sr Security Researcher and Strategist discusses the new strain of iOS mobile malware called "Unflod Baby Panda." Listen to learn more about this new mobile security malware, how a device can be infected and how to mitigate and remove the malware from your device.
To stay on top of the latest in mobile security news, subscribe to the Mobile Security Talk channel and check out the Lacoon Mobile Security blog at http://www.lacoon.com/blog/ .
During this episode, we will talk about viruses and malware. After explaining the difference between viruses and malware, we will talk about ways to protect yourself from viruses and malware.
Once we are done talking about viruses and malware, we will open the phones to callers with their own personal questions about PCs.
If you are interested in being part of the show with your personal question about PCs, make sure to call in before 10:00pm CST so we can get a little bit of information about you prior to the show.
Did you know that over 10 million new victims of identity theft are reported to law enforcement every year? According to the Federal Trade Commission, Identity Theft is the fastest growing crime in America.
"Technology Review with Mack Jackson Jr." will bring an increased awareness to the public on Identity Theft and communicate the importance of simple measures in protecting your business and yourself from fraud.
Our show segments will talk about:
How to protect yourself from Identity Theft
New Tech Gadgets
Legal Issues That Effect Your Privacy
Industry Leader Interviews and much more.
Hour one: Malwarebytes. Joining us this hour will be Adam Kujawa, the Head of Malware Intelligence for Malwarebytes. Up for discussion will be the FBI's recent bust of the Blackshade malware.
Hour two: Craig and Charles do Computer and Technology News, brought to you by Slimware Utilities, the Official Optimization Software of Computer America, and answer your computer questions!
We discuss all the tech news from the past week, select the Geek Pick Of The Week, elaborate on the “Big Tech Question/Topic Of The Week” and share your "help!" questions and input.
This Week: Dell's new Android Tablets, Asus Transformer Book T300 Chi 2, Google - Internet Access via Satellite, Android KitKat 4.4.3 is rolling out to Nexus Smartphones & Tablets, Amazon Smartphone?, Malware injected into Website Ads.
Question/Topic of the Week - Let's Talk Apple WWDC 2014 - An unprecedented array of new IOS & OS X features.
Check out our Blog and Video Netcasts at: prestwickcomputer.com
January 10, 2010. A date that lives in infamy in the minds of cyber security experts. That was the day Google and a number of other hi-tech firms announced they'd been hacked by the Chinese. It was also the day the CEO of McAfee, one of the world's most popular antivirus brands, admitted its software had failed to detect the attacks. In the ongoing cat and mouse game of cyber security, this is not all that unusual. It's common knowledge that as soon as one security hole is plugged and another piece of malware is defeated, then yet another rears its ugly head. With the number of organized hacking rings and government sponsored cyber warfare units springing up worldwide, are we quickly coming to the point in time where it's nearly impossible to defend our digital assets? More importantly, if multinational corporations and major banking systems are being attacked with impunity, what chance does the average citizen have of being able to secure their data? Does a different kind of online security system need to be developed in order to prevent a digital Pearl Harbor?