<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Threat Monitor</title><description>The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.</description><managingEditor>noreply@blogger.com (Unknown)</managingEditor><pubDate>Wed, 28 Aug 2024 13:42:40 -0400</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">30</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://threatmonitor.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>All Rights Reserved, Copyright 2000 - 2006, TechTarget</copyright><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords><itunes:summary>The Threat Monitor podcast is a semimonthly tip that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.</itunes:summary><itunes:subtitle>The Threat Monitor podcast is a semimonthly tip that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.</itunes:subtitle><itunes:category text="Technology"><itunes:category text="IT News"/></itunes:category><itunes:author>SearchSecurity.com</itunes:author><itunes:owner><itunes:email>editor@searchsecurity.com</itunes:email><itunes:name>SearchSecurity.com</itunes:name></itunes:owner><item><title>Finding malware on your Windows box (using the command line)</title><link>http://threatmonitor.blogspot.com/2007/08/finding-malware-on-your-windows-box.html</link><pubDate>Thu, 16 Aug 2007 09:13:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-4477961848886502340</guid><description>Security professionals typically overlook the Windows command line, instead spending their time with more complex GUI-based forensics tools. In this tip, Ed Skoudis explains how just a few command-line tricks can help users closely examine the configuration of a Windows machine and discover whether a box is infected by malware.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="4256222" type="audio/mpeg" url="http://media.techtarget.com/searchSecurity/downloads/Windows_command_line.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Security professionals typically overlook the Windows command line, instead spending their time with more complex GUI-based forensics tools. In this tip, Ed Skoudis explains how just a few command-line tricks can help users closely examine the configuration of a Windows machine and discover whether a box is infected by malware.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>Security professionals typically overlook the Windows command line, instead spending their time with more complex GUI-based forensics tools. In this tip, Ed Skoudis explains how just a few command-line tricks can help users closely examine the configuration of a Windows machine and discover whether a box is infected by malware.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Metamorphic malware sets new standard in antivirus evasion</title><link>http://threatmonitor.blogspot.com/2007/08/metamorphic-malware-sets-new-standard.html</link><pubDate>Thu, 16 Aug 2007 09:11:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-5439550429463361161</guid><description>Mutating computer viruses have been around for some time, but one type of malware possesses the ability to constantly rewrite its own code to successfully evade the most sophisticated antivirus systems. Noah Schiffman explains how metamorphic malware works, how it differs from polymorphic malware and which defense strategies are best for enterprises.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="5221725" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/TM_metamorphic_malware_V2.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Mutating computer viruses have been around for some time, but one type of malware possesses the ability to constantly rewrite its own code to successfully evade the most sophisticated antivirus systems. Noah Schiffman explains how metamorphic malware works, how it differs from polymorphic malware and which defense strategies are best for enterprises.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>Mutating computer viruses have been around for some time, but one type of malware possesses the ability to constantly rewrite its own code to successfully evade the most sophisticated antivirus systems. Noah Schiffman explains how metamorphic malware works, how it differs from polymorphic malware and which defense strategies are best for enterprises.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Unified communications infrastructure threats and defense strategies</title><link>http://threatmonitor.blogspot.com/2007/07/unified-communications-infrastructure.html</link><pubDate>Thu, 19 Jul 2007 16:18:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-3771596350842191647</guid><description>Unified communications systems promise exciting productivity gains for workers and cost savings for businesses, but many often underestimate the security threats facing them. John Burke outlines the dangers facing unified communications and how to mount an effective defense.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="5904191" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/TM_UCommThreats.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Unified communications systems promise exciting productivity gains for workers and cost savings for businesses, but many often underestimate the security threats facing them. John Burke outlines the dangers facing unified communications and how to mount an effective defense.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>Unified communications systems promise exciting productivity gains for workers and cost savings for businesses, but many often underestimate the security threats facing them. John Burke outlines the dangers facing unified communications and how to mount an effective defense.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Investigating logic bomb attacks and their explosive effects</title><link>http://threatmonitor.blogspot.com/2007/07/investigating-logic-bomb-attacks-and.html</link><pubDate>Thu, 19 Jul 2007 16:16:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-1521498628398070657</guid><description>There are a lot of dirty and destructive pieces of software out there, but a logic bomb may cause some of the most damage. Triggered by the smallest of events, logic bombs can wreck computers, networks, and even an organization's precious profits. In this tip from our Ask the Experts section, contributor Ed Skoudis explains how to prepare for a hacker's detonation.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="3104638" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/ThreatMonitor_logic_bomb.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>There are a lot of dirty and destructive pieces of software out there, but a logic bomb may cause some of the most damage. Triggered by the smallest of events, logic bombs can wreck computers, networks, and even an organization's precious profits. In this tip from our Ask the Experts section, contributor Ed Skoudis explains how to prepare for a hacker's detonation.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>There are a lot of dirty and destructive pieces of software out there, but a logic bomb may cause some of the most damage. Triggered by the smallest of events, logic bombs can wreck computers, networks, and even an organization's precious profits. In this tip from our Ask the Experts section, contributor Ed Skoudis explains how to prepare for a hacker's detonation.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Mergers and acquisitions: Building up security after an M&amp;A</title><link>http://threatmonitor.blogspot.com/2007/06/mergers-and-acquisitions-building-up.html</link><pubDate>Thu, 21 Jun 2007 16:56:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-4219796064946551797</guid><description>Mergers and acquisitions are common headlines in today's information security world, and that's great news for malicious hackers and data thieves. When companies join forces, they often leave themselves open to attack. In this tip, contributor Ed Skoudis reviews the top merger-related threats and how to avoid them.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="5923811" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/06_21_07_MergerThreatsV2.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Mergers and acquisitions are common headlines in today's information security world, and that's great news for malicious hackers and data thieves. When companies join forces, they often leave themselves open to attack. In this tip, contributor Ed Skoudis reviews the top merger-related threats and how to avoid them.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>Mergers and acquisitions are common headlines in today's information security world, and that's great news for malicious hackers and data thieves. When companies join forces, they often leave themselves open to attack. In this tip, contributor Ed Skoudis reviews the top merger-related threats and how to avoid them.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Finding and blocking Web application server attack vectors</title><link>http://threatmonitor.blogspot.com/2007/06/finding-and-blocking-web-application.html</link><pubDate>Thu, 7 Jun 2007 09:02:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-2653174391115413545</guid><description>Web application server attacks are nothing new, but attackers are coming up with creative new ways to penetrate them. Information security expert Peter Giannoulis examines how data-hungry attackers are using Web application servers to crack into back-end databases, and offers advice on what can be done to protect Web infrastructures.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="4483139" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/06_07_07_WebApp_Servers_v3.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Web application server attacks are nothing new, but attackers are coming up with creative new ways to penetrate them. Information security expert Peter Giannoulis examines how data-hungry attackers are using Web application servers to crack into back-end databases, and offers advice on what can be done to protect Web infrastructures.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>Web application server attacks are nothing new, but attackers are coming up with creative new ways to penetrate them. Information security expert Peter Giannoulis examines how data-hungry attackers are using Web application servers to crack into back-end databases, and offers advice on what can be done to protect Web infrastructures.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Windows Vista security flaws show progress, not perfection</title><link>http://threatmonitor.blogspot.com/2007/05/windows-vista-security-flaws-show.html</link><pubDate>Thu, 17 May 2007 15:37:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-6062805490590346657</guid><description>Microsoft has touted Windows Vista as its most secure operating system ever. But if that's the case, why has it already been the subject of several high-profile security problems? As Ed Skoudis explains, despite its improvements, Vista's security posture is far from perfect.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="5222021" type="audio/mpeg" url="http://media.techtarget.com/searchSecurity/downloads/05_17_07_Vista_security_flaws.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Microsoft has touted Windows Vista as its most secure operating system ever. But if that's the case, why has it already been the subject of several high-profile security problems? As Ed Skoudis explains, despite its improvements, Vista's security posture is far from perfect.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>Microsoft has touted Windows Vista as its most secure operating system ever. But if that's the case, why has it already been the subject of several high-profile security problems? As Ed Skoudis explains, despite its improvements, Vista's security posture is far from perfect.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Employee profiling: A proactive defense against insider threats</title><link>http://threatmonitor.blogspot.com/2007/05/employee-profiling-proactive-defense.html</link><pubDate>Thu, 3 May 2007 09:57:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-1950957924949543492</guid><description>Employee profiling is one technique to combat malicious insiders, but organizations should tread carefully. As identity and access management expert Joel Dubin writes, protecting data and systems against insiders with criminal intentions requires a multifaceted defensive strategy.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="4869781" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/05_03_07_Employee_Profiling.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Employee profiling is one technique to combat malicious insiders, but organizations should tread carefully. As identity and access management expert Joel Dubin writes, protecting data and systems against insiders with criminal intentions requires a multifaceted defensive strategy.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>Employee profiling is one technique to combat malicious insiders, but organizations should tread carefully. As identity and access management expert Joel Dubin writes, protecting data and systems against insiders with criminal intentions requires a multifaceted defensive strategy.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Reputation systems gaining credibility in fight against spam</title><link>http://threatmonitor.blogspot.com/2007/04/reputation-systems-gaining-credibility.html</link><pubDate>Thu, 19 Apr 2007 06:55:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-942721688559505450</guid><description>Now that nearly all organizations are employing some sort of antispam technology, spammers know their only hope for success lies with outwitting spam-detection strategies. But as Mike Rothman writes, the emergence of reputation-based systems is making it easier to weed out spam before it ever reaches the network gateway.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author></item><item><title>Polymorphic viruses call for new antimalware defenses</title><link>http://threatmonitor.blogspot.com/2007/04/polymorphic-viruses-call-for-new.html</link><pubDate>Thu, 5 Apr 2007 16:20:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-8738463918532347110</guid><description>Attackers are always looking for innovative ways to dodge antivirus software, and many of the bad guys are now creating polymorphic code to do just that. But it's not just the malware writers who are raising the bar. In this tip from our Ask the Experts section, contributor Ed Skoudis explains how antimalware vendors are responding to this emerging threat.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author></item><item><title>Plentiful VoIP exploits demand careful consideration</title><link>http://threatmonitor.blogspot.com/2007/03/plentiful-voip-exploits-demand-careful.html</link><pubDate>Thu, 15 Mar 2007 11:36:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-3823224432027213001</guid><description>Enterprise VoIP vendors may tout "plug-and-play" products that are ready to run right out of the box, but those vendors may not be taking security into consideration. As information security threats expert Ed Skoudis writes, there are many potential VoIP threat vectors, but packet-based telephony services can be secured with due diligence and adherence to best practices.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="4386247" type="audio/mpeg" url="http://media.techtarget.com/searchSecurity/downloads/03_15_07_TM_VoIP_exploits.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Enterprise VoIP vendors may tout "plug-and-play" products that are ready to run right out of the box, but those vendors may not be taking security into consideration. As information security threats expert Ed Skoudis writes, there are many potential VoIP threat vectors, but packet-based telephony services can be secured with due diligence and adherence to best practices.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>Enterprise VoIP vendors may tout "plug-and-play" products that are ready to run right out of the box, but those vendors may not be taking security into consideration. As information security threats expert Ed Skoudis writes, there are many potential VoIP threat vectors, but packet-based telephony services can be secured with due diligence and adherence to best practices.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>The security risks of Google Notebook</title><link>http://threatmonitor.blogspot.com/2007/03/security-risks-of-google-notebook.html</link><pubDate>Thu, 1 Mar 2007 14:07:00 -0500</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-6070319479604759485</guid><description>Security practitioners know to keep sensitive information under lock and key, but as Web services proliferate, ensuring that information remains private is more difficult than ever. In this tip, Ed Skoudis examines how one of Google's latest Web applications, Google Notebook, can lead to accidental exposure of sensitive data, and provides five ways to reduce the chances of a data leak.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="3523158" type="audio/mpeg" url="http://media.techtarget.com/searchSecurity/downloads/03_01_07_TM_Google_Notebook_fv.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Security practitioners know to keep sensitive information under lock and key, but as Web services proliferate, ensuring that information remains private is more difficult than ever. In this tip, Ed Skoudis examines how one of Google's latest Web applications, Google Notebook, can lead to accidental exposure of sensitive data, and provides five ways to reduce the chances of a data leak.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>Security practitioners know to keep sensitive information under lock and key, but as Web services proliferate, ensuring that information remains private is more difficult than ever. In this tip, Ed Skoudis examines how one of Google's latest Web applications, Google Notebook, can lead to accidental exposure of sensitive data, and provides five ways to reduce the chances of a data leak.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Pod slurping: The latest data threat</title><link>http://threatmonitor.blogspot.com/2007/02/pod-slurping-latest-data-threat.html</link><pubDate>Thu, 15 Feb 2007 08:57:00 -0500</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-1627371847649610241</guid><description>Allow iPods in the office? Perhaps it's time to reevaluate that&lt;br /&gt;device policy, as iPods pose more danger to the corporate network&lt;br /&gt;than it might seem.  In this tip, contributor Peter Giannoulis&lt;br /&gt;introduces pod slurping, the latest hacking technique, and explains&lt;br /&gt;how revising corporate policies can prevent potential data leaks.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="5065217" type="audio/mpeg" url="http://media.techtarget.com/searchSecurity/downloads/02_15_TM_Podslurping.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Allow iPods in the office? Perhaps it's time to reevaluate that device policy, as iPods pose more danger to the corporate network than it might seem. In this tip, contributor Peter Giannoulis introduces pod slurping, the latest hacking technique, and explains how revising corporate policies can prevent potential data leaks.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>Allow iPods in the office? Perhaps it's time to reevaluate that device policy, as iPods pose more danger to the corporate network than it might seem. In this tip, contributor Peter Giannoulis introduces pod slurping, the latest hacking technique, and explains how revising corporate policies can prevent potential data leaks.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Is the CAN-SPAM Act a help or a hindrance?</title><link>http://threatmonitor.blogspot.com/2007/02/is-can-spam-act-help-or-hindrance.html</link><pubDate>Thu, 1 Feb 2007 11:01:00 -0500</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-8958810027406725963</guid><description>&lt;span style=";font-family:Franklin Gothic Book;font-size:85%;"  &gt;&lt;span style=";font-family:'Franklin Gothic Book';font-size:10;"  &gt;Three years have  passed since CAN-SPAM was enacted, but has this legislation truly contained  unsolicited commercial email? In this tip, contributor Joel Dubin examines if  the law has effectively cracked down on spamming activities and examines how to  put a stop to this email misuse.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="5780676" type="audio/mpeg" url="http://media.techtarget.com/searchSecurity/downloads/02_01_07v2_ThreatMonitor.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Three years have passed since CAN-SPAM was enacted, but has this legislation truly contained unsolicited commercial email? In this tip, contributor Joel Dubin examines if the law has effectively cracked down on spamming activities and examines how to put a stop to this email misuse.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>Three years have passed since CAN-SPAM was enacted, but has this legislation truly contained unsolicited commercial email? In this tip, contributor Joel Dubin examines if the law has effectively cracked down on spamming activities and examines how to put a stop to this email misuse.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Ten emerging malware trends for 2007</title><link>http://threatmonitor.blogspot.com/2007/01/ten-emerging-malware-trends-for-2007.html</link><pubDate>Wed, 17 Jan 2007 09:59:00 -0500</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-116904610284981629</guid><description>From phishing threats to zero-day flaws, hackers have certainly developed many sophisticated ways to exploit vulnerabilities for their gain. And, as SearchSecurity.com's information security expert Ed Skoudis explains, new methods are constantly being discovered.  In this podcast, Skoudis outlines 10 emerging malware trends and provides tools and tactics to defend against them.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="3059190" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/01_18_07_TM_emerging_malware_trends.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>From phishing threats to zero-day flaws, hackers have certainly developed many sophisticated ways to exploit vulnerabilities for their gain. And, as SearchSecurity.com's information security expert Ed Skoudis explains, new methods are constantly being discovered. In this podcast, Skoudis outlines 10 emerging malware trends and provides tools and tactics to defend against them.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>From phishing threats to zero-day flaws, hackers have certainly developed many sophisticated ways to exploit vulnerabilities for their gain. And, as SearchSecurity.com's information security expert Ed Skoudis explains, new methods are constantly being discovered. In this podcast, Skoudis outlines 10 emerging malware trends and provides tools and tactics to defend against them.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Eight top information security events of 2006</title><link>http://threatmonitor.blogspot.com/2007/01/eight-top-information-security-events.html</link><pubDate>Sat, 13 Jan 2007 14:58:00 -0500</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-116871834181092617</guid><description>From WMF exploits to the Veterans Affairs data breach, information security threats were plentiful in 2006. In this tip, contributor Joel Dubin reviews what grabbed the attention of hackers in the information security world in 2006 and explains how they set the tone for 2007.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="6237445" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/01_04_07_TM.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>From WMF exploits to the Veterans Affairs data breach, information security threats were plentiful in 2006. In this tip, contributor Joel Dubin reviews what grabbed the attention of hackers in the information security world in 2006 and explains how they set the tone for 2007.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>From WMF exploits to the Veterans Affairs data breach, information security threats were plentiful in 2006. In this tip, contributor Joel Dubin reviews what grabbed the attention of hackers in the information security world in 2006 and explains how they set the tone for 2007.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Using steganography for securing data, not concealing it</title><link>http://threatmonitor.blogspot.com/2006/12/using-steganography-for-securing-data.html</link><pubDate>Thu, 21 Dec 2006 08:48:00 -0500</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-116670893687773165</guid><description>Steganography is a useful technique for securely storing sensitive&lt;br /&gt;data, but the difficulty in detecting its usage can create an&lt;br /&gt;opportunity for digital miscreants. Michael Cobb explains how to&lt;br /&gt;ensure the practice isn't used maliciously.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="3627439" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/12_21_06_Threat_Monitor_Steganography.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Steganography is a useful technique for securely storing sensitive data, but the difficulty in detecting its usage can create an opportunity for digital miscreants. Michael Cobb explains how to ensure the practice isn't used maliciously.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>Steganography is a useful technique for securely storing sensitive data, but the difficulty in detecting its usage can create an opportunity for digital miscreants. Michael Cobb explains how to ensure the practice isn't used maliciously.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>How simple steps ensure database security</title><link>http://threatmonitor.blogspot.com/2006/11/how-simple-steps-ensure-database.html</link><pubDate>Thu, 16 Nov 2006 09:46:00 -0500</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-116368846943672391</guid><description>An enterprise database stores an organization’s most valuable assets, and just one small mistake can lead to a data security disaster. In this tip, Michael Cobb looks at five common database vulnerabilities and the simple steps that can eradicate them.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="3398560" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/security_technicalbriefing1_2006.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>An enterprise database stores an organization’s most valuable assets, and just one small mistake can lead to a data security disaster. In this tip, Michael Cobb looks at five common database vulnerabilities and the simple steps that can eradicate them.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>An enterprise database stores an organization’s most valuable assets, and just one small mistake can lead to a data security disaster. In this tip, Michael Cobb looks at five common database vulnerabilities and the simple steps that can eradicate them.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Defensive measures for evolving phishing tactics</title><link>http://threatmonitor.blogspot.com/2006/10/defensive-measures-for-evolving.html</link><pubDate>Wed, 18 Oct 2006 13:31:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-116119282779366948</guid><description>From image  spam to cross-site scripting, hackers certainly have a large arsenal of weapons  to choose from. But as AT&amp;amp;T recently learned, hackers are putting a new  twist on ever-dependable phishing schemes to gain access to confidential and  sensitive information. In this tip, Ed Skoudis examines how phishing tactics  have evolved and what enterprises can do to defend  themselves.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="3371485" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/TM_10_19_2006.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>From image spam to cross-site scripting, hackers certainly have a large arsenal of weapons to choose from. But as AT&amp;amp;T recently learned, hackers are putting a new twist on ever-dependable phishing schemes to gain access to confidential and sensitive information. In this tip, Ed Skoudis examines how phishing tactics have evolved and what enterprises can do to defend themselves.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>From image spam to cross-site scripting, hackers certainly have a large arsenal of weapons to choose from. But as AT&amp;amp;T recently learned, hackers are putting a new twist on ever-dependable phishing schemes to gain access to confidential and sensitive information. In this tip, Ed Skoudis examines how phishing tactics have evolved and what enterprises can do to defend themselves.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Malware: The changing landscape</title><link>http://threatmonitor.blogspot.com/2006/10/malware-changing-landscape.html</link><pubDate>Wed, 4 Oct 2006 16:10:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-115999268732695930</guid><description>Malware is arguably growing faster than ever before, but not in ways the industry has come to expect. Even though the days of the superworm might be numbered, contributor Mike Chapple says it's time for organizations to adapt their defense postures because the next generation of threats won't be as easy to detect.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="4109931" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/TM_Changing_Malware_10_5_06.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Malware is arguably growing faster than ever before, but not in ways the industry has come to expect. Even though the days of the superworm might be numbered, contributor Mike Chapple says it's time for organizations to adapt their defense postures because the next generation of threats won't be as easy to detect.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>Malware is arguably growing faster than ever before, but not in ways the industry has come to expect. Even though the days of the superworm might be numbered, contributor Mike Chapple says it's time for organizations to adapt their defense postures because the next generation of threats won't be as easy to detect.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Does blogging pose enterprise information security risks?</title><link>http://threatmonitor.blogspot.com/2006/09/does-blogging-pose-enterprise.html</link><pubDate>Wed, 20 Sep 2006 15:34:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-115878097119242260</guid><description>While blogging  can be a useful marketing and communications tool, if not controlled it can pose  significant risks to corporate information security. In this tip,  SearchSecurity.com expert Mike Chapple examines these risks and  how they can be reduced by creating and implementing blogging policies.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="4102920" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/TM_Blogging_Risks_09_21_06.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>While blogging can be a useful marketing and communications tool, if not controlled it can pose significant risks to corporate information security. In this tip, SearchSecurity.com expert Mike Chapple examines these risks and how they can be reduced by creating and implementing blogging policies.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>While blogging can be a useful marketing and communications tool, if not controlled it can pose significant risks to corporate information security. In this tip, SearchSecurity.com expert Mike Chapple examines these risks and how they can be reduced by creating and implementing blogging policies.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Laptop crypto: Do it, but realize it's not a panacea</title><link>http://threatmonitor.blogspot.com/2006/09/laptop-crypto-do-it-but-realize-its.html</link><pubDate>Thu, 7 Sep 2006 08:43:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-115763308036617140</guid><description>With headlines declaring data thefts becoming more prevalent and increasingly scarier, the need for enterprises to enforce laptop security is as crucial as ever. In this tip, Ed Skoudis reviews the pros and cons of laptop encryption and explains how, while it is the not the final solution, it can keep your data secure -- even if it falls in the hands of the enemy.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="5421792" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_TM_Laptop_Crypto_09-07-06-.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>With headlines declaring data thefts becoming more prevalent and increasingly scarier, the need for enterprises to enforce laptop security is as crucial as ever. In this tip, Ed Skoudis reviews the pros and cons of laptop encryption and explains how, while it is the not the final solution, it can keep your data secure -- even if it falls in the hands of the enemy.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>With headlines declaring data thefts becoming more prevalent and increasingly scarier, the need for enterprises to enforce laptop security is as crucial as ever. In this tip, Ed Skoudis reviews the pros and cons of laptop encryption and explains how, while it is the not the final solution, it can keep your data secure -- even if it falls in the hands of the enemy.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Battling image spam</title><link>http://threatmonitor.blogspot.com/2006/08/battling-image-spam.html</link><pubDate>Wed, 16 Aug 2006 16:08:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-115575906680100009</guid><description>In the ever-changing world of threats, spammers have once again discovered a new way to bypass spam filters using a new technique called “image spam.” In this tip, Mike Chapple provides an example of image spam and explains how the threat can hurt your organization, and what you can do to protect against these attacks.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="4055065" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/081706_Security_TM_Image_Spam.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>In the ever-changing world of threats, spammers have once again discovered a new way to bypass spam filters using a new technique called “image spam.” In this tip, Mike Chapple provides an example of image spam and explains how the threat can hurt your organization, and what you can do to protect against these attacks.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>In the ever-changing world of threats, spammers have once again discovered a new way to bypass spam filters using a new technique called “image spam.” In this tip, Mike Chapple provides an example of image spam and explains how the threat can hurt your organization, and what you can do to protect against these attacks.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Avoiding the scourge of DNS amplification attacks</title><link>http://threatmonitor.blogspot.com/2006/08/avoiding-scourge-of-dns-amplification.html</link><pubDate>Wed, 2 Aug 2006 13:23:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-115453946601888574</guid><description>DNS amplification attacks can generate enough bogus traffic to blow almost anyone off the Internet. Learn how these packet flood attacks work and how to defend your organization.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="4480852" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/80306_Security_TM_DNS_Amplification_Attacks.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>DNS amplification attacks can generate enough bogus traffic to blow almost anyone off the Internet. Learn how these packet flood attacks work and how to defend your organization.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>DNS amplification attacks can generate enough bogus traffic to blow almost anyone off the Internet. Learn how these packet flood attacks work and how to defend your organization.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item><item><title>Secure instant messaging in the enterprise</title><link>http://threatmonitor.blogspot.com/2006/07/secure-instant-messaging-in-enterprise.html</link><pubDate>Thu, 13 Jul 2006 11:56:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-30745025.post-115280633879025394</guid><description>Instant messaging can be a conduit through which viruses come in to and sensitive data goes out of the corporate network. Enterprises need a thorough IM policy and the technical measures to back it up, regardless of whether IM is allowed or strictly prohibited. This tip outlines the factors you should consider when writing an IM policy and the technical measures for enforcing it.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>editor@searchsecurity.com (SearchSecurity.com)</author><enclosure length="3404651" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_TM_Secure_IM-07-20-06.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Instant messaging can be a conduit through which viruses come in to and sensitive data goes out of the corporate network. Enterprises need a thorough IM policy and the technical measures to back it up, regardless of whether IM is allowed or strictly prohibited. This tip outlines the factors you should consider when writing an IM policy and the technical measures for enforcing it.</itunes:subtitle><itunes:author>SearchSecurity.com</itunes:author><itunes:summary>Instant messaging can be a conduit through which viruses come in to and sensitive data goes out of the corporate network. Enterprises need a thorough IM policy and the technical measures to back it up, regardless of whether IM is allowed or strictly prohibited. This tip outlines the factors you should consider when writing an IM policy and the technical measures for enforcing it.</itunes:summary><itunes:keywords>computer,security,threats,,information,security,threats,hack,attacks,,viruses,,worms,,Trojans,,backdoors,,bots,,spyware,,idenity,theft,and,DDoS,</itunes:keywords></item></channel></rss>