23 episodes

The Threat Monitor podcast is a semimonthly tip that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.

Threat Monitor SearchSecurity.com

    • Technology

The Threat Monitor podcast is a semimonthly tip that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.

    Finding malware on your Windows box (using the command line)

    Finding malware on your Windows box (using the command line)

    Security professionals typically overlook the Windows command line, instead spending their time with more complex GUI-based forensics tools. In this tip, Ed Skoudis explains how just a few command-line tricks can help users closely examine the configuration of a Windows machine and discover whether a box is infected by malware.

    Metamorphic malware sets new standard in antivirus evasion

    Metamorphic malware sets new standard in antivirus evasion

    Mutating computer viruses have been around for some time, but one type of malware possesses the ability to constantly rewrite its own code to successfully evade the most sophisticated antivirus systems. Noah Schiffman explains how metamorphic malware works, how it differs from polymorphic malware and which defense strategies are best for enterprises.

    Unified communications infrastructure threats and defense strategies

    Unified communications infrastructure threats and defense strategies

    Unified communications systems promise exciting productivity gains for workers and cost savings for businesses, but many often underestimate the security threats facing them. John Burke outlines the dangers facing unified communications and how to mount an effective defense.

    Investigating logic bomb attacks and their explosive effects

    Investigating logic bomb attacks and their explosive effects

    There are a lot of dirty and destructive pieces of software out there, but a logic bomb may cause some of the most damage. Triggered by the smallest of events, logic bombs can wreck computers, networks, and even an organization's precious profits. In this tip from our Ask the Experts section, contributor Ed Skoudis explains how to prepare for a hacker's detonation.

    Mergers and acquisitions: Building up security after an M&A

    Mergers and acquisitions: Building up security after an M&A

    Mergers and acquisitions are common headlines in today's information security world, and that's great news for malicious hackers and data thieves. When companies join forces, they often leave themselves open to attack. In this tip, contributor Ed Skoudis reviews the top merger-related threats and how to avoid them.

    Finding and blocking Web application server attack vectors

    Finding and blocking Web application server attack vectors

    Web application server attacks are nothing new, but attackers are coming up with creative new ways to penetrate them. Information security expert Peter Giannoulis examines how data-hungry attackers are using Web application servers to crack into back-end databases, and offers advice on what can be done to protect Web infrastructures.

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Hard Fork
The New York Times
TED Radio Hour
NPR
Lex Fridman Podcast
Lex Fridman
Darknet Diaries
Jack Rhysider