Monday, October 25, 2010
Where are those botnet CnC's at?
›
If you're building or managing a botnet of more than a few thousand victim machines, where and how you host your command and control (Cn...
Tuesday, September 28, 2010
In situ Automated Malware Analysis
›
Over the past few years there's been a growing trend for enterprise security teams to develop their own internal center of excellence fo...
Sunday, September 19, 2010
Intel Pentium Processor "Performance Upgrade"
›
Catching up with some of the RSS feeds I monitor earlier today I came across some chatter about the newly launched/noticed upgrade option f...
Saturday, September 18, 2010
Musings on Metasploit
›
The week before last I attended and spoke at the OWASP AppSec 2010 conference on the first day, meanwhile HD Moore spoke on the second day....
3 comments:
Saturday, September 4, 2010
Infinite Malware & Infinite Protection?
›
Infinite detection of malware? In Sophos' blog entry " To infinity and beyond " it's pointed out that there's an infin...
1 comment:
Friday, August 20, 2010
Blacklists, Clustering and The Matrix
›
Blacklists are the mainstay of many security technologies protecting enterprise networks today. Despite being used practically everywhere ho...
Monday, July 12, 2010
Mobile Threats - Cellular Botnets
›
Smartphones are getting smarter. You know it, I know it, and every would-be criminal botnet operator knows it too. But why haven't we s...
Forgotten Password?
›
The increased proliferation of malware and botnet agents designed to rapidly intercept, retrieve and copy the passwords you use on a daily b...
‹
›
Home
View web version