Educating the Educators: Protecting Student Data

I found my 17-year-old son happily playing video games last year when he was supposed to be in virtual school. But after a few questions, I learned he wasn’t skipping school. His class had been canceled after his teacher fell for a phishing attack, and their computer was infected with a virus. This isn’t an […]

The post Educating the Educators: Protecting Student Data appeared first on Security Intelligence.

Continue reading Educating the Educators: Protecting Student Data

New Security Enhancements for Microsoft Windows Server 2016

Windows Server 2016 includes enhanced security features, such as VM encryption capabilities and a minimal Nano Server to reduce the attack surface.

The post New Security Enhancements for Microsoft Windows Server 2016 appeared first on Security Intelligence.

Continue reading New Security Enhancements for Microsoft Windows Server 2016

Fighting Fire With WinDBG: Breaking URLZone’s Anti-VM Armor

URLZone, a sophisticated banking Trojan that first emerged in 2009, keeps its inner workings under wraps with extensive anti-research features.

The post Fighting Fire With WinDBG: Breaking URLZone’s Anti-VM Armor appeared first on Security Intelligence.

Continue reading Fighting Fire With WinDBG: Breaking URLZone’s Anti-VM Armor

GootKit: Bobbing and Weaving to Avoid Prying Eyes

IBM X-Force researchers recently studied the GootKit banking Trojan — and the many ways it effectively evades detection and maintains persistence.

The post GootKit: Bobbing and Weaving to Avoid Prying Eyes appeared first on Security Intelligence.

Continue reading GootKit: Bobbing and Weaving to Avoid Prying Eyes

Security and the Virtual Network: Part I

Virtual networks are becoming a popular choice for enterprises due to their flexibility, but it’s not simple to select the right option.

The post Security and the Virtual Network: Part I appeared first on Security Intelligence.

Continue reading Security and the Virtual Network: Part I