The Malware Report show

The Malware Report

Summary: Anti-virus protection has changed. New forms of spyware, trojans, phishing, and run-time packers leave traditional anti-virus software, and your network, vulnerable. IT managers need new solutions to combat the ever changing threats to network security.

Podcasts:

 Hacked Card Readers And The Gangs Behind Them | File Type: audio/mpeg | Duration: 04:06

New easy to use card readers offer bad guys crime-ware as a service. One swipe of a credit card and they have access to the account and can even print duplicate cards.

 Remote Desktop (RDP) Hacking 101 | File Type: audio/mpeg | Duration: 04:31

Remote Desktop Services, while allowing you to work remotely, can also give the bad guys access to your computer, or even let them take it over completely.

 Popular Orbit Downloader Goes Rogue | File Type: audio/mpeg | Duration: 04:52

ESET researchers find dangerous updates have been added to the popular Orbit Downloader program.

 ESET Discovery: Hesper Bot Banking Trojan | File Type: audio/mpeg | Duration: 05:36

ESET discovers an all new banking trojan that not only captures your information on your Windows based computer, but also has a mobile phone component that can take money directly out of your account.

 Getting Smart About Security | File Type: audio/mpeg | Duration: 06:22

As college students return to school, what up-to-date resources are available to help them get smart about security?

 Spotting Bad Android Apps, Part 2 | File Type: audio/mpeg | Duration: 05:29

Reputation matters. Using reviews and the information on the app producers can help users stay safe in the Google Play store.

 Spotting Bad Android Apps, Part 1 | File Type: audio/mpeg | Duration: 02:39

How to users of Google's Android app store look for and avoid the 60,000 plus bad or bogus apps?

 Summer Device Safety: Part 2 | File Type: audio/mpeg | Duration: 04:36

How to keep your mobile devices physically safe and avoid theft when traveling on planes, trains, and automobiles. Part two of two.

 Summer Device Safety: Part I | File Type: audio/mpeg | Duration: 03:44

How to keep your devices safe when traveling on planes, trains, and automobiles. Part one of two.

 NIST Cyber Sercurity Framework 101 | File Type: audio/mpeg | Duration: 04:49

The National Institute of Standards and Technology now focusing on securing critical infrastructure, like power grids and natural gas lines, throughout the US.

 TOR Based Botnets: Creating Zombie Computer Armies Anonymously | File Type: audio/mpeg | Duration: 04:20

The Onion Router or TOR allows good guys and bad to send messages, sell products, and now launch botnets through an virtually untraceable network.

 FDA Alert On Medical Device Security | File Type: audio/mpeg | Duration: 03:58

The FDA announces a security warning for potential vulnerabilities to a variety of medical devices.

 Health Care IT Security Hygiene: Part 2 | File Type: audio/mpeg | Duration: 05:26

98% of all hospitals have had a security breach within the last two years. What is being breached and what are the common security mistakes?

 Health Care IT Security Hygiene: Part 1 | File Type: audio/mpeg | Duration: 04:52

As productivity, efficiency, and financial pressures drive healthcare to use more technology, there is a greater risk of patient data and other private records becoming available to the bad guys.

 Smart Device Security On Vacation | File Type: audio/mpeg | Duration: 04:53

With more web enabled devices being used on vacations, how do users stay safe from theft while traveling?

Comments

Login or signup comment.