Posted on

How the Chameleon Botnet Stole $6M Per Month in Click Fraud Scam- A Case Study

“This case study looks at how the Chameleon Botnet Stole $6M Per Month in Click Fraud Scam.”

Fill out the form below to download your whitepaper!

Posted on

Evernote Hack : How 50 Million Accounts Were Compromised : A Step by Step Account

“This case study looks at how hackers recently attacked Evernote’s system and gained access to information on more than 50 million users, including encrypted password files.”

Fill out the form below to download your whitepaper!

Posted on

Tracking Hackers using HoneyDocs

Police in Austin,Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey’s Web service, HoneyDocs – born in the same city — uses the same concept, only with computer files. Download this case study to learn more.

Fill out the form below to download your whitepaper!

Posted on

Thwarting Advanced Persistent Threats

This paper was written to help you understand some of these new “advanced persistent” threats and to discuss the kinds of investments you can make today to help prepare your organization to successfully defend itself on the key battlefield of the 21st Century: cyberspace.

Fill out the form below to download your whitepaper!

Posted on

Recent Security Breaches

Target, Neiman Marcus and Michaels Are Not the Only Companies to Blame for the Recent Security Breaches. Some of the low cost QSA Companies are behind some of the biggest security breaches in the USA.

Fill out the form below to download your whitepaper!

Posted on

Pen Test Tool Usage

“Organizations with the technical capabilities to buy and use penetration-testing tools can reduce risk and gain business benefits. Penetration-testing services can be used by organizations that do not have the expertise or personnel available.” – A Gartner Study.

Fill out the form below to download your whitepaper!

Posted on

NSA Tracking Tor Users

The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA’s application vulnerabilities branch, which is part of the Systems Intelligence Directorate (SID). Download this case study to learn more.

Fill out the form below to download your whitepaper!

Posted on

New York Times,Twitter Hacked by Syrian group

Get an insight on how a Syrian group hacked the New York Times’ Twitter account – one of the top media companies in the world. Security experts said electronic records showed that NYTimes.com, the only site with an hours-long outage, redirected visitors to a server controlled by the Syrian group before it went dark.

Fill out the form below to download your whitepaper!

Posted on

League of Legends is Hacked, with Crucial User info Accessed

One of the world’s most popular online video games falls prey to a security breach involving usernames, e-mail addresses, salted passwords, and 120,000 salted credit card numbers.

Fill out the form below to download your whitepaper!

Posted on

Justifying Security Investments

Is your security program efficient and effective? This is a fundamental question and yet extremely difficult for many security professionals to answer.

Fill out the form below to download your whitepaper!