The Malware Report show

The Malware Report

Summary: Anti-virus protection has changed. New forms of spyware, trojans, phishing, and run-time packers leave traditional anti-virus software, and your network, vulnerable. IT managers need new solutions to combat the ever changing threats to network security.

Podcasts:

 Three Flavors of Authentication | File Type: audio/mpeg | Duration: 5:18

A detailed description of the three types of authentication security. What are they and when are they used?

 RSA 2013 Hot Topic: Cloud Security | File Type: audio/mpeg | Duration: 04:42

At the 2013 RSA conference, many of the presentations and products focused on the Cloud. As cloud services mature, security is coming to the forefront of the discussion.

 Windows 8 VS RT Security | File Type: audio/mpeg | Duration: 3:54

Windows 8 and Windows RT: How are they different and new tips on how to secure the devices that use the new Windows OS.

 Media Becomes Popular Target of State Sponsored Hacking | File Type: audio/mpeg | Duration: 04:56

Are stolen files and information from U.S. media companies the result of state sponsored attacks?

 Poker Agent Stealing Facebook Account Credentials | File Type: audio/mpeg | Duration: 03:37

Poker Agent, a game found on Facebook, is not only a botnet distributing scams through your account, but a sophisticated program that tries to harvest and categorize your personal and financial data.

 Are Webcams a Security Threat? | File Type: audio/mpeg | Duration: 04:37

Virtually every digital device including laptops, cell phones and tablets have a video camera capable of being used as a webcam. What are the security issues and how can users avoid them?

 Lost Digital Devices Part 2: What Should You Do? | File Type: audio/mpeg | Duration: 04:22

What should you do if your laptop, phone, or tablet is lost or stolen?

 Lost Digital Devices Part 1: Where Do They Go Missing? | File Type: audio/mpeg | Duration: 02:45

1 in 10 people have had a laptop, smartphone, or tablet go missing. Theft or loss of a digital device is a big security risk as well as a big hassle. Where do they most often get stolen?

 Another Zero Day Exploit of Java: Is It Really Worth The Risk? | File Type: audio/mpeg | Duration: 05:13

Latest Java exploit allows attackers to fake browsers into serving up malicious code when visiting a website that has been compromised.

 The Rise of Moblie Malware for The Android Platform | File Type: audio/mpeg | Duration: 05:20

Why has mobile malware on the Android platform risen 1700% in 2012? Will the trend continue in 2013?

 Unwrapping Mac Security | File Type: audio/mpeg | Duration: 03:56

In 2012 we saw the largest Mac malware attacks ever. What three critical steps should you take to secure your new Apple computer?

 Unwrapping PC Security | File Type: audio/mpeg | Duration: 04:48

Now that Windows based computers no longer come with "restore" disks, there are some vital steps to keep your new computer safe before going online.

 Unwrapping Android Security | File Type: audio/mpeg | Duration: 07:32

Anti-virus protection has changed. New forms of spyware, trojans, phishing, and run-time packers leave traditional anti-virus software, and your network, vulnerable. IT managers need new solutions to combat the ever changing threats to network security.

 What Hackers Want | File Type: audio/mpeg | Duration: 07:41

Anti-virus protection has changed. New forms of spyware, trojans, phishing, and run-time packers leave traditional anti-virus software, and your network, vulnerable. IT managers need new solutions to combat the ever changing threats to network security.

 Industrial Malware Machines Ready To Deploy In 2013 | File Type: audio/mpeg | Duration: 05:09

Anti-virus protection has changed. New forms of spyware, trojans, phishing, and run-time packers leave traditional anti-virus software, and your network, vulnerable. IT managers need new solutions to combat the ever changing threats to network security.

Comments

Login or signup comment.