Cyber Attacks
- September 15, 2014The backdoor malware MIRAS got an upgrade from just running in 32-bit Windows operating system versions to 64-bit ones, expanding its victim range to more users of the OS. MIRAS is the same malware family linked to attacks against a Europe-based IT company.
- September 14, 2014Threats analyst Bryant Tan shares some rules that IT administrators can proactively implement to set up “basic defense” for their network. These rules are not meant to cover all types of suspicious activity but are important in building a secure network.
- September 14, 2014A few rules that IT administrators can proactively implement to set up “basic defenses” for their network that are likely to be missed.
- September 04, 2014When attackers look at a target network, they focus on the flaws that they can exploit, then customize their attacks based on these. What can IT admins do knowing that the weakest link usually lie with people, passwords, and places that are considered secure?
- August 14, 2014Targeted attacks are designed to circumvent existing policies and solutions within the target network, making detection a challenge. To do this, IT administrators need to know what to look for, and where to check for signs of compromise.