Tag Archive for: Defend

Zero-day attacks: How DoD should defend from the unknown – C4ISR & Networks


C4ISR & Networks

Zero-day attacks: How DoD should defend from the unknown
C4ISR & Networks
Department of Defense networks are evolving away from signature-based protection to more effective strategies that could stop a potentially devastating damage from a zero-day attack. Signature-based protection identifies viruses and malware by

“zero day” – read more

New tool from Cloudmark is designed to defend against spear phishing  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  

The nature of how cyber attacks start is changing. Today’s malicious actors are not merely opportunistic, they know what information they want and who to target to get at it. For example, the 2014 breach at JP Morgan reportedly began when an IT employee opened a specially-crafted email and was tricked into providing credentials to a vulnerable internal machine. Attackers used the privileges of that person’s credentials to move around the network until they were able to find and exfiltrate 83 million records in one of the largest data breaches of the year.

To read this article in full or to leave a comment, please click here

Network World Security

Google Will Have to Defend Android at I/O Conference – PCWorld

Google Will Have to Defend Android at I/O Conference
PCWorld
Analysts said they will also be on the lookout this week for possible new features on Google+, upgrades to Google Maps and improvements to Android security.

and more »

“android security” – read more