Smoke and Mirrors

Or the art of active defense and enemy disorientation “You can ensure the safety of your defense if you only hold positions that cannot be attacked. Hence that general is skillful in attack whose opponent does not know what to defend; and he is skillful in defense whose opponent does not know what to attack.” … Read more Smoke and Mirrors

Man in the browser attack mitigation

Malware such as Neverquest, Zeus or GameOver Zeus is getting more aggressive every day and the stealth way it steals money makes it even more dangerous. The methods used by Neverquest and similar MITB (man-in-the-browser) attacks are described in the following video: and at the following Wikipedia page: http://en.wikipedia.org/wiki/Man-in-the-browser In short: by obtaining full control … Read more Man in the browser attack mitigation

Data Loss Incidents: preparation and response

Business operations may and usually do depend on maintaining control over critical information. You may, however, lose control over this information (whether it would be lost, deleted, stolen, published, etc) – in this case you may need to respond to a security incident. Even though you should be concerned about potentially malicious hackers breaking through … Read more Data Loss Incidents: preparation and response

Preventing Cyber Espionage

With any business involving serious research & development, where a new and disruptive technology is at stake or where information could build or destroy a business or a product there is a risk of cyber / conventional economic espionage. Essentially, that is preventing APT (Advanced Persistent Threat) from being a risk for you – or … Read more Preventing Cyber Espionage