PC Magazine Fighting Spyware, Viruses, and Malware

Rating: 
Amazon Price: $29.99 (as of April 21, 2018 20:16 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Think there's no malicious software on your computer? PC Magazine thinks you should think again.

Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer–like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by following Ed Tittel's advice, you can learn how invasions occur, spot an infestation, repair damage that's already done, and slam the door on those who want to hijack your PC–along with your wallet.
Continue reading “PC Magazine Fighting Spyware, Viruses, and Malware”

Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet’s Greatest Threat

Rating: 
Amazon Price: N/A (as of April 20, 2018 23:27 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.

Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware’s ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware’s intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware.
Continue reading “Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat”

Cuckoo Malware Analysis

Rating: 
Amazon Price: N/A (as of April 21, 2018 00:46 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In Detail

Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment.
Continue reading “Cuckoo Malware Analysis”

Cybersecurity for Everyone: Securing your home or small business network

Rating: 
Amazon Price: $13.99 $13.99 (as of April 21, 2018 21:16 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Specifically for home users and small business owners, cybersecurity expert Terry Sadler lays out the easy-to-learn methods and tips that will make using the Internet more safe and secure and protect the family as well as the business. -Identity Theft. According to the Symantec Internet Security Report (2014), mega breaches are data breaches that result in at least 10 million identities exposed in an individual incident. There were eight mega breaches in 2013, compared with only one in 2012. – Viruses and Malware. Some security experts estimate there are more than 250,000 new malware variants detected daily and more than 30,000 websites exploited daily. These numbers are staggering. – Email Security. Learn how to reduce the amount of SPAM that makes it to your inbox. Improve your email security habits and discover better ways to communicate safely and with privacy. – Internet and Browsing Security. You cannot afford to leave the security of your sensitive information up to your ISP. It is actually easy to apply a layered approach to security and minimize your risk. Learn about your options; then pick and choose what works for you and your situation.

Safe Computing is Like Safe Sex: You have to practice it to avoid infection

Rating: 
Amazon Price: $12.99 $12.99 (as of April 21, 2018 22:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Computer Security Can be Achieved Even in a World full of Hackers, Viruses and Spam You can Protect your Computer and your Valuable Information, Bank Accounts and Photos Without Breaking the Budget or Hiring an Expert.

What if practising a few new habits could dramatically reduce the chances of your system being infected with a virus or attacked by a hacker? Imagine surfing the web without worrying about the terrors of credit card fraud or identity theft? What if you could keep the bad guys away with a few simple applications?
Continue reading “Safe Computing is Like Safe Sex: You have to practice it to avoid infection”