The Malware Report show

The Malware Report

Summary: Anti-virus protection has changed. New forms of spyware, trojans, phishing, and run-time packers leave traditional anti-virus software, and your network, vulnerable. IT managers need new solutions to combat the ever changing threats to network security.

Podcasts:

 Hungry For Power: New Report Highlights Grid Attacks | File Type: audio/mpeg | Duration: 04:17

Critical infrastructure such as power plants and smart grids have become increasingly appealing targets for hackers.

 Needles in Haystacks: The Art Of Threat Attribution | File Type: audio/mpeg | Duration: 05:00

After a major attack there is a difficult and often delicate task of threat attribution: determining the person or organization behind the attack.

 Windows XP: New Security Tips for Older OS | File Type: audio/mpeg | Duration: 04:28

Running Windows XP? What can you do to keep your compurters and your business secure?

 Windows 8: Six Month Check up | File Type: audio/mpeg | Duration: 03:15

Despite a healthy adoption rate, the Windows 8 new start screen is causing confusion and frustration for its users.

 Windows 8: Six Month Check up | File Type: audio/mpeg | Duration: 06:10

Despite a healthy adoption rate, the Windows 8 new start screen is causing confusion and frustration for its users.

 Linux Web Server Malware | File Type: audio/mpeg | Duration: 6:00

More than 400 webservers infected with Linux/Cdorked.A. Out of these, some are ranked the top 100,000 most popular websites.

 Web Security for Small Businesses: New Attacks on Linux Servers | File Type: audio/mpeg | Duration: 05:44

Small Businesses need to be proactive in protecting their web servers from attackers. Was your business website built with security in mind? Where is it being hosted and by whom?

 Cyber Security Road Map For Businesses: Part 2 | File Type: audio/mpeg | Duration: 04:43

Time to deploy and test the controls you have chosen. Do they work, and do they work with your business?

 Cyber Security Road Map For Businesses: Part 1 | File Type: audio/mpeg | Duration: 04:12

Learn the ABCs for success in developing a cyber security road map for your business: assess, build, and choose controls.

 Low Tech Security Stumbles | File Type: audio/mpeg | Duration: 04:26

How low tech, physical security breaches can have rippling effects to cyber security.

 Avoiding Tragedy Scams | File Type: audio/mpeg | Duration: 04:23

The bombing at the Boston Marathon brought out the best and worst in people online. Avoid the scams and self promoters looking to take advantage when disaster strikes.

 Spotting Social Media Scams | File Type: audio/mpeg | Duration: 06:25

Why do social media sites and apps make it hard for their users to be secure? How to spot a social media scam.

 Tax Related Scams Plague IRS and Tax Payers | File Type: audio/mpeg | Duration: 05:10

The carrot and the stick: looking at the rise of phishing emails around the tax deadline including those promising a refund or requesting payment from the IRS.

 Hello to We Live Security | File Type: audio/mpeg | Duration: 04:14

ESET Research team launches new website, WeLiveSecurity.com. Businesses and consumers will now have easier access to podcasts, videos, research papers and articles on hot topics.

 NIST Vulnerability Database Down | File Type: audio/mpeg | Duration: 03:58

Irony abounds as the National Institute of Standards Technology recently had its Vulnerability Database taken down by hackers.

Comments

Login or signup comment.