When I was growing up there were not a lot of female role models in technology. Then again, there also were not that many female role models that worked outside the home. But in my community, there was always a firm belief that females could do whatever they wanted to do. This mentality was built […]

The security world, as many specialty fields, is full of acronyms. Those of us in the business know a SIEM from an IPS from a NGFW, and we’re happy to explain the difference to customers, many of whom know exactly what we’re talking about. There’s one set of acronyms, though, that can be confusing: APTs […]

Everyone loves a good deal—including hackers. Unfortunately, after a brief quiet period in the world of data breaches, it appears as though Goodwill Industries, purveyor of second-hand clothing and goods, may be suffering from a series of credit card breaches nationwide. This is especially troubling as it affects a group of people who may be […]

When I turned 25, I saw this as a pretty big milestone in my life.  At 25 years old, I felt like a true adult – I was now all grown up.  I was educated, employed, experienced and stable.   But when I look back, the journey from childhood to adulthood was really far from over […]

The W32/Worm-AAEH family (aliases: Beebone, VObfus, Changeup) of Trojans/downloaders/worms has been notorious for consistently morphing itself and switching control servers since June 2009. In June 2013, the AAEH worm made its biggest cosmetic change since 2009 by packaging an entire encrypted binary (containing all the malicious W32/Worm-AAEH code) inside its signature cryptor, which previously held only […]