Data Protection June 11, 2021 Educating the Educators: Protecting Student Data 5 min read - I found my 17-year-old son happily playing video games last year when he was supposed to be in virtual school. But after a few questions, I learned he wasn’t skipping school. His class had been canceled after his teacher fell…
February 14, 2019 Catastrophe, Not Compromise: VFEmail Attack Destroys Decades of Data 2 min read - The email provider VFEmail suffered a "catastrophic" hack that destroyed the company's primary and backup data servers in the U.S.
Risk Management October 27, 2016 New Security Enhancements for Microsoft Windows Server 2016 2 min read - Windows Server 2016 includes enhanced security features, such as VM encryption capabilities and a minimal Nano Server to reduce the attack surface.
Malware September 2, 2016 Fighting Fire With WinDBG: Breaking URLZone’s Anti-VM Armor 10 min read - URLZone, a sophisticated banking Trojan that first emerged in 2009, keeps its inner workings under wraps with extensive anti-research features.
Malware July 8, 2016 GootKit: Bobbing and Weaving to Avoid Prying Eyes 7 min read - IBM X-Force researchers recently studied the GootKit banking Trojan — and the many ways it effectively evades detection and maintains persistence.
Network March 15, 2016 Security and the Virtual Network: Part I 2 min read - Virtual networks are becoming a popular choice for enterprises due to their flexibility, but it's not simple to select the right option.
Cloud Security December 3, 2015 Ethereum: A Second-Generation Blockchain for the IoT 3 min read - Ethereum is an updated blockchain technology that could be well-suited for the IoT. But how does it work, and is it a capable solution?
X-Force September 4, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part III 3 min read - In the final installment of this series, we focus on S$A attacks as well as some ways your organization can prevent side-channel attacks on its VMs.
X-Force August 28, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part II 6 min read - Discussion of two side-channel attacks meant to retrieve sensitive information from a virtual machine (VM) on the same physical processor package.
Cloud Security August 21, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part I 4 min read - This discussion is meant to facilitate the understanding of side-channel attacks, which affect today's modern multicore processors.