Reports

Top Factors Driving Endpoint Security Strategy

Antivirus Software is dying. What will replace it?

In this industry perspective, Dan Larson of the firm CrowdStrike argues that antivirus software is becoming less effective at stopping damaging cyber attacks, but that companies need to look before they leap when replacing it. 

A flaw in the WPA-2 wireless protocol leaves millions of device vulnerable to hacking and other malicious acts.

Update: Flaw in widely used Wi-Fi Standard could allow snooping

Hundreds of millions of wireless devices may be affected by a flaw in WPA-2, a widely used standard for securing wireless Internet connections.  (Updated to add commentary by Bob Rudis of Rapid 7.)

Research Finds Home Routers fill ranks of Fast Flux Botnets

Research Finds Home Routers fill ranks of Fast Flux Botnets

Research from the firm Akamai finds cyber criminals are marrying vulnerable home routers to sophisticated “fast flux” command and control tools to create long-lived, cyber criminal infrastructure.

Kaspersky Lab disputed a report in the Wall Street Journal that its software played a role in the theft of NSA hacing tools from a government contractor.

Kaspersky Lab CEO says company may be hacking victim

CEO Eugene Kaspersky likened a Wall Street Journal report on his company’s software being used to hack an NSA contractor to “the script of a C movie” and said his company was in the middle of a geopolitical dispute. 

Five years ago today we posted our first blog entry! A lot has changed...

Security Ledger Turns 5!

I’m not much of one for milestones and the record will show that I’ve rarely taken the occasion to note significant Security Ledger dates. Actually, it would be more accurate to say that I’ve never noted them. But October 2nd marks what I consider an important one: the fifth anniversary of our first blog post. On October 2, 2012, this blog went live with a post on the VOHO watering hole attacks. That makes today – October 2, 2017, Security Ledger’s 5th birthday! So much has happened in the intervening years – and much remains the same. Sadly, we haven’t beat watering hole attacks, though maybe we talk about them less than we used to. The last five years have seen this blog focus more and more on the security of our physical world and the many, intelligent devices that inhabit it.  That has proven to be a very rich seam […]