Books on cybersecurity: 5+ recommendations from our experts
We recently approached our experts and asked which books they would recommend for would-be malware analysts. Here is their list.
143 articles
We recently approached our experts and asked which books they would recommend for would-be malware analysts. Here is their list.
Malware using Tor for communication with C&C servers is a novelty; it may not make the malware itself more dangerous, but eradicating it becomes a much more serious problem.
Kaspersky Lab released results of a 10-months long analysis of Epic Turla APT campaign, which is still active. One of the most sophisticated cyber-espionage campaigns, it attacked victims in 45 countries.
Kaspersky Lab has just released a new report on the evolution of threats in Q2. Banking Trojans grow in numbers (and the level of danger they pose), while Russia remains the most malware-attacked country.
Overextended lifecycle of an OS at a certain point becomes a security problem. Will merging all Windows platforms into a single one lead to a shortening of Windows lifecycles?
Microsoft’s announcement that it is going to consolidate all of its major platforms into one is quite a logical move. But what are the possible consequences regarding businesses and cybersecurity?
“Trojan” in computing is a misleading shortening from the self-descriptive “Trojan horse”, the ubiquitous and probably the most dangerous sort of malware.
Backdoor is a very graphic term, but does it explain the tech behind it? We try to shed some light.
Facebook has little to do with cybersecurity – it’s not a vendor. But at a certain point it took the battle against botnets to the enemy territory.
DoS/DDoS attacks is another popular, but somewhat under explained, term in cybersecurity. Explaining it in detail would take a monograph, so we’ll just hit the high points.
These young researchers will shape cyberworld in the next decade.
IT departments take most of the responsibility for the company cybersecurity. However, how fair is it to charge them with 100% of responsibility for everything that happens there? Cynthia James shares her thoughts on this matter.
New Kaspersky Lab’s survey shows VSB owners are well aware of IT threats, but their priorities lie elsewhere and the “immunity by obscurity” approach is a bit too common.
It’s time to reconsider our stance on data storage, and in the process, perhaps we can force a little cybersecurity education. One solution is to apply “The Three Ps” to every data storage decision a company makes (at least about PII or valuable secrets).
May 2014 appears to be very stormy and volatile in regards to information security. Still overshadowed by Heartbleed and Windows XP “official demise” from April, it has brought a lot of troubles on its own.
March brought with it a host of new security stories, and with those stories came our continued promise to keep you informed while providing protection against cybercriminals. From our interactive
Last week brought us a host of news stories, including a handful of highlights. As usual, we have collected the most interesting security news and are bringing it to you