tag
Infosecurity Magazine

Nitol Botnet: You Will Never Break The Chain

Nitol versus Michelangelo: the supply chain is much more than the production line.

Rakshasa hardware backdooring: the demon that can't be exorcized?

Jonathan Brossard describes an ‘undetectable, unremovable’ attack on firmware through gimmicked hardware or a subsequent malware attack. David Harley isn’t convinced.

Infosecurity Magazine on AMTSO's credibility gap

I was interviewed yesterday by Fred Donovan, following up on the paper on AMTSO I presented at EICAR earlier this month. I may be prejudiced, but I think he's summarized my current  thoughts on the topic pretty well in the article, though it isn't my recommendation that the existing guidelines be reviewed independently: it was

Soothsaying, Forsooth!

If you haven’t yet had enough of the crystall balls that have been bouncing all over the media and the blogosphere in the past few weeks…

Cyberhype

Cyberwar, cyberterrorism, cybersigh…(gosh, that's almost a palindrome…) However, if you get past the cyberbuzzwords, there are some interesting articles around at the moment. On the Infosecurity Magazine, there's an article called "Cyberterrorism: A look into the future", contributed by the (ISC)2 US Government Advisory Board Executive Writers Bureau.  http://www.infosecurity-magazine.com/view/5217/cyberterrorism-a-look-into-the-future/. More thoughtful than you might expect from

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

26 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.