- Welcome Guest
- Sign In
Network forensics is the capture, storage and analysis of network traffic. You might also hear the term referred to as "packet mining," "packet forensics," or "digital forensics." Regardless of the name, the concept is the same, with the objective to record every packet and the data it contains movi...
It started as an act of Web site defacement by some anti-capitalist zealots, attacking one of Canada's largest multinational corporations. You know the kind -- they've got their fingers in all kinds of business pies, from airplane parts to media content to their own very popular brand of hand saniti...
Unified Communications holds enormous promise as a coherent, integrated approach to incorporating the full spectrum of business communications modalities, and as direct path to cut through "communications clutter" resulting in accelerated time-to-action. It also offers a cost-effective way to more d...
Can the Web's big-time masters of malware really be tracked down? How risky is cloud computing to network security? And what challenges await the Obama administration's plans to lock down the nation's electronic infrastructure -- while at the same time creating a "smart grid?" An experienced panel o...
Computer infrastructure has become the foundation of businesses, governments, and militaries across the globe. Unfortunately, the onset of computer dependence has only opened a myriad of opportunities for cybercrime and potentially devastating consequences. Unlike in the past, when criminals would h...
Regardless of the agreements or disagreements on how individuals, companies and governments are to combat cybercrime, one fact stands true: Doing nothing is the worst posture to assume. Cyberrisk is as limitless as human determination, ingenuity and ignorance. As such, it is crucial we take the righ...
With the constantly evolving Internet security threatscape, being able to actually get a grasp on the latest threats, let alone arm oneself against them, can seem overwhelming. While there are seemingly limitless best practices in regard to cybersecurity, below are several that should help reduce t...
The current threatscape, as with any landscape, can be viewed as endless vistas of changing complexities and unfathomable permutations of technologies, network topologies, risk scenarios and user requirements. It's the white noise of this dizzying array of technologies -- built upon an operating sys...
Cybercrime is pervasive, pandemic and increasingly connected with other parts of the criminal ecosystem. It ranges from the theft of an individual's identity to the complete disruption of a country's Internet connectivity due to a massive attack against its networking and computing resources. This i...
The Obama administration appears to be having as much trouble as its predecessors in decrypting the secrets of how to retain its cybersecurity advisers. Monday's resignation of Melissa Hathaway, who served as acting senior director for cyberspace for the National Security and Homeland Security Counc...
Despite the best efforts of the computer security industry, hackers are launching more attacks than ever. In turn, members of the industry are working together to combat the threat. In line with this, Microsoft on Monday unveiled some new tools at the Black Hat security conference in Las Vegas, Nev....
Once again, the CEO of a major American company has met an untimely -- and fake -- demise on the pages of CNN's iReport Web site -- and once again, the mischief-making Web site 4chan is suspected of being behind it all. It's likely that excutive Randall Stephenson was selected as the cybervandalism ...
Everyone knows the old adage that "out of sight" is "out of mind." There's quite a bit of truth to it. It's a facet of human nature that things that are directly in front of our face get noticed, while things that are out of our scope of awareness don't. Seems pretty obvious, right? In fact, it i...
The month of June saw a host of Web-based attacks compromising legitimate Web sites. One, dubbed "Nine Ball," compromised more than 40,000 Web sites. Another attack injected a malicious script into large numbers of legitimate sites. Victims who access such tainted Web sites are infected with malwar...
Trend Micro on Monday announced LeakProof 5.0, designed to reduce the complexity and cost often associated with the discovery, monitoring and blocking of sensitive enterprise data. New features are built around the Active Update service and language-independent fingerprinting technology the company ...