(ISC)2 on Cyberterrorism
Interesting article from Infosecurity Magazine. Cyberterrorism: A look into the future 12 November 2009 (ISC)2 US Government Advisory Board Executive Writers Bureau Available at:...
View ArticleA few links
We hear a lot about identity fraud, but here’s a page that looks at it from the point of view of the small (UK) business....
View ArticlePre-KeRanger Mac Ransomware
While working on an internal project at ESET, I came across an article I wrote for Information Security Magazine back in 2013: Mac Ransomware Deviating from the (java)script. With the recent kerfuffle...
View Article(ISC)2 on Cyberterrorism
Interesting article from Infosecurity Magazine. Cyberterrorism: A look into the future 12 November 2009 (ISC)2 US Government Advisory Board Executive Writers Bureau Available at:...
View ArticleA few links
We hear a lot about identity fraud, but here’s a page that looks at it from the point of view of the small (UK) business....
View ArticlePre-KeRanger Mac Ransomware
While working on an internal project at ESET, I came across an article I wrote for Information Security Magazine back in 2013: Mac Ransomware Deviating from the (java)script. With the recent kerfuffle...
View Article
More Pages to Explore .....