Welcome to the Tenable Network Security Podcast Episode 125 Announcements New Nessus Feature Added: CSV Export Tenable Network Security Named Top ‘Cyber Warrior’ at Baltimore SmartCEO VOLT Awards Check out our video channel on YouTube which contains new Nessus and SecurityCenter 4 tutorials. We’re hiring!… View full post on National…
Tenable Network Security Podcast Episode 125 – “Detecting Quicktime Vulnerabilities, Hotel Hackers”
Welcome to the Tenable Network Security Podcast Episode 125 Announcements New Nessus Feature Added: CSV Export Tenable Network Security Named Top ‘Cyber Warrior’ at Baltimore SmartCEO VOLT Awards Check out our video channel on YouTube which contains new Nessus and SecurityCenter 4 tutorials. We’re hiring!… View full post on National…
Detecting and removing the Flashback malware in OS X
Recently a new variant of the Imuler/Revir Trojan malware for OS X was found being distributed disguised as erotic images that, if installed on a Mac system, would attempt to steal personal information then upload them to remote servers. The malware’s initial variants included offensive political material, but in its…
Tenable Network Security Podcast Episode 111 – “Detecting pcAnywhere, browser vulnerabilities, & hacking cars”
Welcome to the Tenable Network Security Podcast Episode 111 Hosts Paul Asadoorian, Product Evangelist Carlos Perez, Lead Vulnerability Researcher Ron Gula, CEO/CTO Jack Daniel, Product Manager Announcements Check out our video channel on YouTube that contains the latest Nessus and SecurityCenter 4 tutorials. The “Top Ten Things You Didn’t Know…
Understanding and Detecting Mobile Malware Threats
Every couple of years there’s a new “hot threat” in security for which vendors abruptly tout newfangled protection and potential customers clamor for additional defense options. Once upon a time it was spyware, a few years ago it was data leakage, and today it’s mobile malware. It’s a reoccurring cycle,…
Detecting VM sprawl in a private cloud
Learn techniques and tools to track rogue images and inappropriate use. <img alt="Detecting VM sprawl in a private cloud, Blog, cloud, private, Detecting, sprawl"height="0" width="0" border="0" style="display:none" src="http://segment-pixel.invitemedia.com/pixel?code=TechBiz &partnerID=167&key=segment”/> View full post on SearchCloudSecurity: RSS Feed View full post on National Cyber Security
Which Antivirus Products Are Best, Worst at Detecting Malware?
Twice a year, independent antivirus testing lab AV-Comparatives.org releases a report comparing how well 15 to 20 antivirus products can detect malware in an on-demand scan. In the latest report, quite a few products improved their ratings, though a couple cloud-based tools failed to complete the test. AV-Comparatives also switched…
Cyber-thieves targeting Facebook to spread ‘identity detecting’ malware infections
London, July 6 (ANI): Cyber-thieves are reportedly targeting trusted social networking sites like Facebook by spreading malware infections that can quietly hack users’ passwords as they go about logging into their profiles and bank accounts, with the intention of stealing their identities and money. Although malware infections are nothing new…