DDoS Protection Blog

Malware Pair Work in Tandem to Evade Removal

Microsoft has identified two separate forms of malware that work together on an infected computer to make it far more difficult to remove them. In a Malware Protection Center blog, Redmond anti-virus researcher Hyun Choi named the malware as Vobfus and Beebone. What makes them particularly troublesome is that they download updated versions...

Read more

Mobile Malware Follows the Money

Mobile malware mushroomed more than six-fold in the year ending in March, and the people behind it are increasingly behaving like calculating business professionals, a study from Juniper Networks says. “Similar to legitimate developers focused on the rise of mobile, cyber criminals are looking to maximize their return on investment with...

Read more

Step-By-Step Instructions to Implement DMARC in Your Organization, Part 2: Deploying the DMARC Record

In my previous article I covered the preliminary tasks that need to be done when you want to implement the DMARC standard to protect your email domain(s). This article gets into the meat of what to do for actual deployment. I’d like to thank Alec Peterson, CTO of Message Systems, for these step-by-step instructions. Remember that list of...

Read more

Step-By-Step Instructions to Implement DMARC in Your Organization, Part 1: Laying the Groundwork

A few weeks ago I wrote about a way to reduce the likelihood of having your company’s email domain abused by phishers. Alec Peterson of Message Systems and Sam Masiello of Groupon provided good information and advice for deploying the Domain-based Messaging, Authentication, Reporting and Conformance (DMARC) standard for your...

Read more

Next on the IT Security Horizon: Security Analytics

John Pescatore recently joined the SANS Institute as the Director of Emerging Security Trends. His entire 30+ year career has focused on IT security, which gives him a pretty interesting perspective on where we’ve been and where we’re headed. I talked to him recently about what’s on the horizon for IT security. Linda: ...

Read more

More Posts