Mac malware dominated the news this week, as security researchers uncovered a new Trojan capable of hijacking Mac OS X systems and launching denial-of-service attacks on another server, downloading additional malware on the infected system and providing attackers with remote access on to the computer. The Tsunami Trojan was a…
How fast fingerprinting of OLE2 files can lead to efficient malware detection
SophosLabs experts present research describing how heuristics can help anti-virus products discern between benign and malicious OLE2 files. View full post on Naked Security – Sophos View full post on National Cyber Security
ProtectMyID: RT @healthinfosec: RT @healthinfosec Verizon: Lax Credit Card Security Will Lead to More Breaches http://t.co/rDpEB8WD
ProtectMyID: RT @healthinfosec: RT @healthinfosec Verizon: Lax Credit Card Security Will Lead to More Breaches http://t.co/rDpEB8WD View full post on Twitter / ProtectMyID View full post on National Cyber Security
LEAD ENGINEER-NETWORK SECURITY
This level of engineer serves as the security design authority on customer-requested programs. He/she collaborates with the Network Engineering and Project Management to create and implement custom solutions that adhere as closely as possible to existing Design Standards.This role determines business requirements, proposes changes, and develops migration and implementation plans…