Adobe Flash vulnerabilities and exploits have worried users and security professionals for many years. The situation today remains serious. A quick search of the National Vulnerability Database shows 277 vulnerabilities reported in Flash Player since 2011. For Flash zero-day attacks (which means that there was no patch from Adobe when the vulnerability was exploited), researcher […]

originally posted to Dark Reading:  Intel Security Perspectives What too many of the year’s high-profile data breaches had in common. The only thing more depressing than the increasing frequency and growing scale of the cyber attacks in this year’s headlines was the consistency of key attributes across so many of the events. From the retailer […]

Few ideas have done more to focus and clarify IT security strategy than the concept of a cyber attack chain. The attack chain (or kill chain in the original formulation) was first described by Lockheed Martin analysts in a seminal 2011 paper. In a nutshell, the attack chain is a logical sequence used by most […]

The long summer holidays are almost here in Australia. Yippee! For some parents, the idea of spending six weeks with their children is a truly joyous thought, for others – not so much. Getting through a six week vacation relatively unscathed might seem very ambitious.  Arguments around going places, spending money and screen time can […]

New year = new attack vectors. With the holidays in full swing and 2014 coming to a close, McAfee Labs has produced their latest Threats Report. In it, key security predictions for the coming year are discussed, including forecasts around increases in cyber espionage, more frequent attacks on the Internet of Things, and the ‘explosion’ […]