Useful Skepticism Only Comes With Knowledge

Cybersecurity professionals must keep track of what’s going on. There’s no way you can do it yourself, so e-mail newsletters are a vital tool. But just how much credence should we give the latest scary story? I ran into a recent example of a cybersecurity bulletin that started out interesting but quickly included enough red […]
Read More ›

It’s Always Phishing Season

Recent news reports have discussed the FireEye Advanced Threat Report for the Second Half of 2012, specifically the finding that “On average, a malware event occurs at a single organization once every three minutes”.  That’s a shocking statistic to be sure, but to those of us in computer security, a big part of the issue […]
Read More ›

Facing Down the Trojans

“Get a free iPad” read my friend’s post on Facebook. Since I doubt Apple is giving away free iPads, and since I believe they sell enough they don’t need to give free ones away on Facebook, I knew this was a scam. I googled “free iPad” and found multiple sites offering the tablet for free. […]
Read More ›

What if the Light Switch Demanded All Your Personal Information?

You want the lights turned on? We’ll just need access to your credit card numbers, and your PINs and passwords, and all other personal and corporate data, and your current physical location, and … That sounds crazy, right? If all the light switches in the building worked that way, we would see a big run […]
Read More ›

Flame Authorship is Acknowledged… Now What?

Last week the Washington Post reported that “Western officials with knowledge of the effort” said that the malware called Flame had been jointly developed by the United States and Israel. The main surprise here was the announcement itself. The complexity and sophistication of the Flame malware had led researchers to conclude that it was probably […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.