Defending Against an IT Security Threat of Olympic Proportions

If you think defending your company’s network from security attacks is a full-time job, imagine having to pull together a team to protect one of the largest, yet temporary, networks of all time. That’s exactly what BT Security was asked to do for the 2012 Olympic Games in London.

Read more

How Do Hackers Uncover New Vulnerabilities and Weaknesses?

A common question is, “How does a hacking programmer learn about a flaw or vulnerability in the first place?” There are many ways new weaknesses or vulnerabilities are uncovered, but the three most common are source code review, patch dissection, and fuzzy testing.

Read more

What are Zero Day Exploits?

For several years many articles about computer, network, or Internet compromise mention the phrase “zero day exploit” or “zero day attack,” but rarely do these articles define what this is. A zero day exploit is any attack that was previously unknown to the target or security experts in general. Many believe that the term refers to attacks that were just released into the wild or developed by hackers in the current calendar day.

This is generally not the case. The “zero day” component of the term refers to the lack of prior knowledge about the attack. The main feature of a zero day attack is that since it’s an unknown attack, there are no specific defenses or filters for it. Thus, a wide number of targets are vulnerable to the exploit.

Read more

9 Cyber Security Threats to Watch Out for in 2013

Malware has been around for a while and is something IT security personnel already know to watch out for. But this software that is used by attackers to disturb operations, gather information, or gain access to systems will expand its threat in 2013 to include cloud computing, BYOD, and mobile devices. As online criminals become cleverer, here are just a few ways they will attempt to threaten your systems in 2013:

Read more