White Papers

vulnerabilities, plugins, wordpress themes, attackers, access

WordPress Brute Force Attacks: Protecting Your Web Presence

WordPress has the distinction of being one of the most popular blogging systems on the Internet and is used in […]

Read More
adware, spyware, keyloggers, fake antivirus software

Malware: Open Warfare in Cyberspace and the Increasing Malware Threat

Over the years, the definition of the term “virus” has become quite broad and tends to create confusion in the […]

Read More
silent, invisible, infect, malicious files, hijacks hijacks legitimate processes, applications

Poweliks: Active Memory Analysis

Malware authors are increasingly becoming motivated by financial gain. As such, new generations of malware are being created to remain […]

Read More
retail, credit card, security, malware,

Point-of-Sale (POS) Malware: The Escalating Threat

While many large organizations struggle when responding to Point-of-Sale (POS) breaches, smaller companies have become a popular target for these […]

Read More
virus, worm, trojan horse, rootkit, backdoor

Observational Malware Analysis (OMA): A Better Understanding

Observational Malware Analysis (OMA) provides a better understanding of malware capabilities, the mission of the attacker, and the effects on […]

Read More
financial institutions, banks, investors, accounts

Investment Fraud: The Growing Threat to Your Financial Security

As legal standards and regulations evolve, institutions must continue to be proactive in the area of data security. Both internal […]

Read More

Digital Forensics: Employee Misconduct

Employee misconduct is a real danger faced by companies, while the employee works at the company, as well as during […]

Read More