The Increasing Dangers of Code Hooking

Cybercriminals use code hooking to intercept OS function calls to alter or augment their behavior. The technique is becoming more popular and dangerous.

The post The Increasing Dangers of Code Hooking appeared first on Security Intelligence.

Continue reading The Increasing Dangers of Code Hooking

Using Blockchain to Address Drone Cybersecurity

The vast availability of drones raises many concerns about drone cybersecurity. However, blockchain technology may be able to help.

The post Using Blockchain to Address Drone Cybersecurity appeared first on Security Intelligence.

Continue reading Using Blockchain to Address Drone Cybersecurity

As India Gears Up for Cybersecurity Challenges, Threats Are Multiplying

India has launched a series of initiatives aimed at overcoming cybersecurity challenges, decreasing costs and battling modern threats.

The post As India Gears Up for Cybersecurity Challenges, Threats Are Multiplying appeared first on Security Intelligence.

Continue reading As India Gears Up for Cybersecurity Challenges, Threats Are Multiplying

Protecting Your Network Through Understanding DNS Requests

Sometimes it just takes a little common sense and knowledge of your system log files and the DNS requests contained therein to detect a data breach.

The post Protecting Your Network Through Understanding DNS Requests appeared first on Security Intelligence.

Continue reading Protecting Your Network Through Understanding DNS Requests

Why System Administrators Are So Crucial to Security

System administrators are crucial to the health and security of IT environments, yet many get little to no attention until something goes awry.

The post Why System Administrators Are So Crucial to Security appeared first on Security Intelligence.

Continue reading Why System Administrators Are So Crucial to Security

Data Collection Graduates to Actionable Intelligence: Integrating SIEM and IPS for Better Security

Integrating your SIEM and intrusion prevention systems can ensure security professionals identify potential threats and take swift action.

The post Data Collection Graduates to Actionable Intelligence: Integrating SIEM and IPS for Better Security appeared first on Security Intelligence.

Continue reading Data Collection Graduates to Actionable Intelligence: Integrating SIEM and IPS for Better Security

SS7 Vulnerability Isn’t a Flaw — It Was Designed That Way

The SS7 vulnerability may have recently made headlines, but the flaw itself has actually been around for decades and is integral to the user experience.

The post SS7 Vulnerability Isn’t a Flaw — It Was Designed That Way appeared first on Security Intelligence.

Continue reading SS7 Vulnerability Isn’t a Flaw — It Was Designed That Way

Storage in the New Data Center: How to Handle Faster Storage Devices

Data center managers will have to consider how embedding faster storage devices will affect workload balance and communication channels.

The post Storage in the New Data Center: How to Handle Faster Storage Devices appeared first on Security Intelligence.

Continue reading Storage in the New Data Center: How to Handle Faster Storage Devices

Considerations for Patching the Cisco ASA Vulnerability

The Cisco ASA IKE buffer overflow is a critical vulnerability and requires a proactive response. Let’s look at possible Cisco ASA remediation actions.

The post Considerations for Patching the Cisco ASA Vulnerability appeared first on Security Intelligence.

Continue reading Considerations for Patching the Cisco ASA Vulnerability

Evolving Threats: Why Deep Packet Inspection Is Critical for Intrusion Prevention

Traditional approaches to intrusion prevention are not as effective as they once were, and deep packet inspection is an attractive modern option.

The post Evolving Threats: Why Deep Packet Inspection Is Critical for Intrusion Prevention appeared first on Security Intelligence.

Continue reading Evolving Threats: Why Deep Packet Inspection Is Critical for Intrusion Prevention