Malware

An ounce of ransomware prevention…

With basic hygiene and secure backups, agencies can protect and restore their systems after a ransomware attack.

Why everyone still falls for fake emails

Exercises in social engineering focused on why social engineering works, how to prevent such attacks and how to gather digital evidence after an incident.

The growing security threat to virtual systems

Malware innovators are evading automated analysis, forcing agencies to secure virtual machines and networks as completely as other classic IT.

ManTech upgrades enterprise malware defense platform

ManTech updated its Active Defense endpoint malware protection platform to better streamline detection and incident response.

Layer 1 encryption: A step forward for government network security

Already in use among a range of private enterprises and service providers today, Layer 1, 100 gigabit/sec encryption can give government network managers the ability to transport enormous volumes of data in the most secure manner possible.

Follow malware's tracks to thwart cyber attacks

Government agencies need visibility along the full attack continuum – from point of entry, through propagation and post-infection remediation.

Stakes rising as malware matures

How can government best position itself against cyberattacks, which seem to be increasing both in number and sophistication?

What to look for in social malware defense

NSS Labs study found little difference in the performance of five popular enterprise products designed to protect against socially engineered malware, such as fake system upgrades and anti-virus offers.

In virtual town of Alphaville, students prep for cyber sieges

Alphaville is part of the Michigan Cyber Range, a network and classroom training environment designed to prepare IT managers on cybersecurity attacks and defenses.

New tools link enterprise, perimeter and next-gen security

Point solutions to protect the perimeter of the enterprise are not obsolete, but a new generation of tools is arriving to complement them and provide the awareness needed to defend against new complex and targeted threats.

Big data takes on the kill chain

Big data systems can correlate structured and unstructured data to paint a complete picture about an agency’s overall IT health and offer insight into the sophisticated threats.

Can government's cyber defense withstand a market-driven offense?

Attacking U.S. networks has become a profit-driven big business that will put government confidence in its cyber forces to the test.

After Target cyberattack, Congress votes to do precisely nothing

In response to the “very real and serious nature of the cyberthreat today,” the latest version of the National Cybersecurity and Critical Infrastructure Protection Act would ensure that nothing changes.

XP gets some breathing room as Microsoft extends antimalware support

Microsoft announced it will continue to provide updates to antimalware signatures for Windows XP users through July 14, 2015.

Microsoft issues fix for zero-day IE flaw

The vulnerability in all supported versions of Windows has been exploited in watering hole attacks against targeted victims.

A HealthCare.gov denial-of-service attack tool is found. Really.

As if it didn't have enough problems on its own, researchers at Arbor Networks have found a denial-of-service tool targeting the federal government's main health care exchange website.

Internet Explorer leads in tests against social engineering threats

Microsoft browsers perform the best overall in NSS tests of browser-based defenses against socially engineered malware and phishing, but educated users still are the best defense.