Andy (אברהם נפתלי) Blumenthal Leadership, Technology, Life, and Faith ✡
Pages
(Move to ...)
Home
Articles
Books
Facebook
LinkedIn
Links
Muck Rack
Qoshe
Slideshare
SoundCloud
Times of Israel
Twitter
YouTube
▼
Showing posts with label
Malware
.
Show all posts
Showing posts with label
Malware
.
Show all posts
February 21, 2018
From Malware To Malevolent People
›
So in virus protection on the computer, there are 2 common ways antivirus software works: 1) Signature Detection - There are known pa...
October 23, 2017
Cybersecurity Vulnerabilities Database
›
There is a very useful article in Bloomberg about how the U.S. is taking too long to publish cybersecurity vulnerabilities. And the lo...
October 19, 2017
Never Ever More Vulnerable
›
So we have never been more technology advanced. And at the same time, we have never been more vulnerable . As we all know, our cyberse...
November 15, 2016
Why Can't We Keep Our Secrets
›
Well after the now notorious email scandal and other information security mishaps galore, this advertisement in Washington, DC is really q...
May 9, 2015
From Vintage to Modern Threats
›
Just wanted to share this short video captured of vintage fighter planes flying over the Washington Monument in D.C. on Friday, May 8. T...
November 23, 2014
Data 4 Ransom
›
The future of cybercrime will soon become the almost routine taking of your personal and corporate data as hostage. On...
October 20, 2014
Shining A Light On Your Privacy
›
Check out this special report... ~Half a billion~ downloads of the top 10 Flashlights Apps--the ones we all have on our smartphones--and...
March 21, 2014
Safely Detonate That Malware
›
I like the potential of the FireEye Malware Protection System (MPS). Unlike traditional signature-based malware protections like antivi...
March 6, 2014
Beware of Botnets
›
Interesting video demonstration of how botnets work and can literally take over your computer. In essence, your computer becomes a zombi...
September 28, 2013
Insuring Against Cyber Attacks
›
More and more, our technology is at risk of a cyber attack. In fact, just today the Wall Street Journal reported that Iran has hacke...
June 19, 2013
Malware Through A Charger
›
Who would've thought you can get cyber attacked this way... Forbes is reporting that Georgia Tech researchers have discovered an ex...
August 25, 2012
IT Security, The Frankenstein Way
›
Here's a riddle: When is a computer virus not a dangerous piece of malware? Answer: when it is hidden as Frankenstein code. The...
June 25, 2012
Security Advisory For Architecture Drawings
›
Dark Reading (21 June 2012) came out with security news of a AutoCAD Worm called ACAD/Medre.A that targets design documents. I als...
May 29, 2012
A Cyber Security House Of Cards
›
Yesterday there were reports of a new " massive cyber attack " called the Flame. A U.N. Spokesperson called it "the...
April 28, 2012
Governing the Internet Commons
›
Recently, I've been watching a terrific series called America: The Story of Us (12 episodes)--from the History Channel. It is...
February 19, 2012
Big Phish, Small Phish
›
Phishing is an attack whereby someone pretends to be a trustworthy entity, but is really trying to get your personal information ...
October 20, 2011
Be Careful What You Point That At
›
By now many of you may or may not have pointed your smartphones at a QR ("Quick Response") code to get more information on...
June 19, 2011
Crashing The Internet--Are We Prepared?
›
Almost week after week, I read and hear about the dangers of cyber attacks and whether "the big one" is coming. The big one...
September 26, 2010
Now The Computer War Games Are Real
›
The Associated Press is reporting that the Iranian Bushehr Nuclear Plant has been hit with a sophisticated computer worm called Stuxnet . ...
May 15, 2010
What’s Lurking In The Update?
›
In defense, it is a well-known principle that you determine your critical infrastructure, and then harden those defenses—to protect it. T...
›
Home
View web version