security laboratory

December 17, 2014:

3 low-tech threats that lead to high-profile breaches

In an age where data security defenses are getting more and more sophisticated, there will be increased pressure for malicious parties to glean information from within the organization’s walls or public places. Moving forward, we can expect to see a shift from hacking networks to a focus on hacking people. The tactics used to hack […]
December 16, 2014:

Hiring Hackers To Secure The Internet Of Things

How some white hat hackers are changing career paths to help fix security weaknesses in consumer devices and business systems. The first security vulnerability Michael Murray ever reported to Bugtraq was memorable in the way he found it. Back in 2000, the former security researcher discovered a flaw in a function in the Linux kernel […]
December 15, 2014:

Threat Intelligence

The term ‘threat intelligence’ is a popular one in today’s security market where nearly every offering seems to come with a side of threat intelligence. The most valuable threat intelligence offerings uncover data you don’t already have in a form your organization can make quick use of. With so many vendors staking claims in this […]
December 12, 2014:

Threat Landscape Review

This week Palo Alto Networks released the Fall 2014 Threat Landscape Review, a comprehensive assessment of malware trends affecting thousands of organizations in major industries around the world. The research performed by Unit 42 analyzed data from WildFireTM and included the following key findings: All verticals saw e-mail (SMTP) and HTTP as the primary channels […]

Made, Maintained & Powered in USA by CrystalVision