One of the most common methods for distributing PC malware is the use of email spam messages that pose as tracking notifications from popular delivery companies such as DHL Express, FedEx, or UPS. The reason for this popularity is the malware’s effectiveness. Most of the time the victim receiving the message can’t resist opening the […]

It’s hard enough to keep pace with network demands and be able to detect threats in real time. It’s even harder to stay on top of all the information generated about those threats, intrusions and suspicious network behavior. Enter SIEM, Security Information and Event Management, which in an age of big data has become essential […]

As a society, we like I.D. cards. They are the manifestation of our trust that a person is who they say they are and that, yes, bartender, the possessor is old enough to enjoy a glass of cognac. But sometimes those I.D.s aren’t right. Sometimes they’re manipulated into stating things that aren’t true of the […]

There are rules and then there are rules for kids. A set of rules for school, another defined set at games, and a complete set of unwritten rules at home. But there is one field that our kids traverse almost daily, spending hours there at their own free will, mostly unsupervised—the cyber world. Yet few […]

In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at the kernel level to bypass Microsoft’s security for 64-bit Windows systems. Today a small utility program named KPP-Destroyer can be found online. Previous versions of KPP-Destroyer had some bugs on a Windows 8.1 computer, but […]