Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware ... more
FAQs about Threat Monitor:How many episodes does Threat Monitor have?The podcast currently has 23 episodes available.
August 16, 2007Finding malware on your Windows box (using the command line)Security professionals typically overlook the Windows command line, instead spending their time with more complex GUI-based forensics tools. In this tip, Ed Skoudis explains how just a few command-line tricks can help users closely examine the configuration of a Windows machine and discover whether a box is infected by malware....more0minPlay
August 16, 2007Metamorphic malware sets new standard in antivirus evasionMutating computer viruses have been around for some time, but one type of malware possesses the ability to constantly rewrite its own code to successfully evade the most sophisticated antivirus systems. Noah Schiffman explains how metamorphic malware works, how it differs from polymorphic malware and which defense strategies are best for enterprises....more0minPlay
July 19, 2007Unified communications infrastructure threats and defense strategiesUnified communications systems promise exciting productivity gains for workers and cost savings for businesses, but many often underestimate the security threats facing them. John Burke outlines the dangers facing unified communications and how to mount an effective defense....more0minPlay
July 19, 2007Investigating logic bomb attacks and their explosive effectsThere are a lot of dirty and destructive pieces of software out there, but a logic bomb may cause some of the most damage. Triggered by the smallest of events, logic bombs can wreck computers, networks, and even an organization's precious profits. In this tip from our Ask the Experts section, contributor Ed Skoudis explains how to prepare for a hacker's detonation....more0minPlay
June 21, 2007Mergers and acquisitions: Building up security after an M&AMergers and acquisitions are common headlines in today's information security world, and that's great news for malicious hackers and data thieves. When companies join forces, they often leave themselves open to attack. In this tip, contributor Ed Skoudis reviews the top merger-related threats and how to avoid them....more0minPlay
June 07, 2007Finding and blocking Web application server attack vectorsWeb application server attacks are nothing new, but attackers are coming up with creative new ways to penetrate them. Information security expert Peter Giannoulis examines how data-hungry attackers are using Web application servers to crack into back-end databases, and offers advice on what can be done to protect Web infrastructures....more0minPlay
May 17, 2007Windows Vista security flaws show progress, not perfectionMicrosoft has touted Windows Vista as its most secure operating system ever. But if that's the case, why has it already been the subject of several high-profile security problems? As Ed Skoudis explains, despite its improvements, Vista's security posture is far from perfect....more0minPlay
May 03, 2007Employee profiling: A proactive defense against insider threatsEmployee profiling is one technique to combat malicious insiders, but organizations should tread carefully. As identity and access management expert Joel Dubin writes, protecting data and systems against insiders with criminal intentions requires a multifaceted defensive strategy....more0minPlay
March 15, 2007Plentiful VoIP exploits demand careful considerationEnterprise VoIP vendors may tout "plug-and-play" products that are ready to run right out of the box, but those vendors may not be taking security into consideration. As information security threats expert Ed Skoudis writes, there are many potential VoIP threat vectors, but packet-based telephony services can be secured with due diligence and adherence to best practices....more0minPlay
March 01, 2007The security risks of Google NotebookSecurity practitioners know to keep sensitive information under lock and key, but as Web services proliferate, ensuring that information remains private is more difficult than ever. In this tip, Ed Skoudis examines how one of Google's latest Web applications, Google Notebook, can lead to accidental exposure of sensitive data, and provides five ways to reduce the chances of a data leak....more0minPlay
FAQs about Threat Monitor:How many episodes does Threat Monitor have?The podcast currently has 23 episodes available.