There’s a Sucker Born Every Minute
This week yet another phishing scam made the headlines. Facebook users were sent an email encouraging them to click a link that would then download a password stealing program. Most of us won’t fall...
View ArticleThe Zero Day Dance
Yesterday US CERT issued an alert: TA10-238A Microsoft Insecurely Loads Dynamic Libraries. This zero day attack can load in many applications including a few names you may recognize such as Microsoft,...
View ArticleCan You Get The Money Back If Your Business Bank Account is Drained...
Most small to medium businesses don’t know that if a key-logger gets onto a computer that accesses the businesses checking account, the attacker can withdraw funds, and the business is out the money!...
View ArticleTargeted Attacks Spike With Heavy SMB Focus
According to a recent Symantec blog, attackers are targeting SMBs at a greater rate than companies with more than 500 people. Some other interesting facts from Symantec’s cloud research: “The...
View ArticleEndpoint Protection needs to fully integrate Application Control and...
According to Gartner’s latest research report on Endpoint Protection Platforms (January 16th, 2012), the vendors highlighted continue to have problems stopping malware such as targeted attacks. One of...
View ArticleAngry Birds on an HMI
Recently we have been collaborating with Pete Jenney, CTO of SCADA Security Innovation http://scadasecurityinnovation.com/. Savant Protection is partnering with SCADA Security Innovation to address...
View ArticleO’Day vs. Zero Day
Another posting from Pete Jenney, our friend at SCADA Security Innovation… I was recently at an ICS-CERT conference and was surprised to hear speakers referring to Zero Day attack software as O’Day....
View ArticlePropagation
More from Pete Jenney at SCADA Security Innovation…. How do you suppose the Iranian’s so-called “Sword of Justice” attack team could destroy 30,000 PC’s in a single sweep? Simple propagation....
View ArticleHack Exposes Flaw in Bit9 Approach to Application Whitelisting
Many of our customers and supporters have asked me about the Bit9 compromise that was reported last Friday by their CEO. In short Bit9 reported that their digital signing process was compromised and...
View ArticleApplication Whitelisting Should Be Easier to Implement and Use
As we have developed the Savant Enforcer product for protecting endpoints from zero-day attacks and unknown malware, we have received a lot of feedback from customers that they want a product that is...
View Article
More Pages to Explore .....