Monthly Archives: May 2014

Blackshades and its RAT Relatives: The Most Dangerous Malware on the Planet

RAT: Remote Access Tool, Remote Administration Tool, Remote Access Trojan; whatever you call them, all RATs are basically the same. They all allow a user to control one or more computers remotely. Sometimes this is important. Programs like StaffCop allow … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , | Leave a comment

The Buck Stops There: Who is Ultimately Responsible for a Security Breach?

“If ignorance is bliss, there should be more happy people.” ― Victor Cousin. And if the data in the recent Websense/Ponemon report is true, there should be a lot more happy people in IT security. It is not a pretty … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Gartner Research Adds New Dimension to BYOD Security

Gartner’s Recent webinar presented research which puts BYOD (Bring Your Own Device) security in a completely new light. Gartner presenter, Dionisio Zumerle, began the webinar by defining BYOD from a security point of view: “The practice of deliberately breaching enterprise … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

When Appliances Attack…and Sometimes Kill

Nothing is more disconcerting than coming home to find your refrigerator attacking your smart TV over who should be first to use the router to send spam. Yes, refrigerators often contain spam, but not of the digital variety. The refrigerator … Continue reading

Posted in Uncategorized | Tagged , , , , | 1 Comment

Recent Ponemon Institute Study Casts Doubt on the Effectiveness of BYOD Policies

I recently represented InZero Systems at a webinar co-hosted by Larry Ponemon, of the Ponemon Institute, and the security firm, Avecto. The webinar was entitled, Cyber Strategies for Endpoint Defense, and was largely based on the recent report of the … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment