EXPERT ADVICE |
BadUSB 2.0: Exploring USB man-in-the-middle attacks |
This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities. |
Security Think Tank: Blended attacks require blended defences |
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? |
Security Think Tank: Human factor is key to defeating evasive malware |
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? |
Sandnet++ – A framework for analysing and visualising network traffic from malware |
This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware |
Security Think Tank: Addressing the malware arms race |
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? |
No comments:
Post a Comment