Wednesday, July 5, 2017

How can obfuscated macro malware be located and removed?

TechTarget
Latest Technology News and Expert Advice
A roundup of news and tips on the topics you're interested in | July 05, 2017
TechTarget
ISSUE HIGHLIGHTS
How can obfuscated macro malware be located and removed?
IoT malware: How can internet-connected devices be secured?
How does the iSpy keylogger steal passwords and software license keys?
How can enterprises leverage Google's Project Wycheproof?
Ransomware costs not limited to ransoms, research shows
EXPERT ADVICE
How can obfuscated macro malware be located and removed?
A new type of macro malware has the ability to evade the detection of virtual machines and sandbox environments. Expert Nick Lewis explains how to find and remove this malware.  
IoT malware: How can internet-connected devices be secured?
IoT botnet DDoS attacks have been growing in volume and impact. Expert Nick Lewis explains how you can ensure your internet-connected devices are secure from IoT malware.  
How does the iSpy keylogger steal passwords and software license keys?
A recent version of the iSpy keylogger has the ability to steal passwords and record Skype chats. Expert Nick Lewis explains how it works and how to protect your systems.  
How can enterprises leverage Google's Project Wycheproof?
Google's Project Wycheproof tests crypto libraries for known vulnerabilities, but there are potential drawbacks to this tool. Expert Matthew Pascucci explains them.  
Ransomware costs not limited to ransoms, research shows
The financial fallout from ransomware involves more than bitcoins, one study found. Targeted companies invest in security technology and fear loss of reputation and customers.  
About This E-Newsletter
This email is published by the TechTarget Security Media Group. Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.
TechTarget
To unsubscribe from all Security Media Group emails,
Go to unsubscribe.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this email, your information may be shared with the sponsors of that content as described in our Privacy Policy.

About TechTarget:
TechTarget publishes media for IT pros with more than 100 focused websites providing quick access to a deep store of news, advice and analysis about the technologies, products and processes crucial to your job.

No comments: