Matthew Hines

Hathaway at RSA: Obama Admin’s Missed Opportunity

Based on what we’ve seen from our new President thus far, one of the Obama Administration’s top priorities is, and will be, taking advantage of ready opportunities to foster stronger relationships with important constituencies that can help the United States advance its interests across many different domains. No matter what side of the aisle you […]

Catching Up with RSA

If you’ve been watching this space at all the last few days (if anyone is still watching) you’ve noticed a serious lack of coverage of any kind, in particular a total absence of any writing about the RSA Conference. But not because I’m lazy! My excuse is that I’ve been busy working my day job […]

Is Anybody Watching?

Everybody knows that many of today’s compromised devices result from end user visits to infected Web sites or downloads of unapproved applications, however, few organizations are taking the time to carefully monitor or police people’s online hygiene. While many companies are beginning to look at applications white-listing technologies, and organizations in heavily-regulated industries such as […]

E-Mobsters Continue Brazen Extortion

The Verizon Business Data Breach (.pdf) that was published today seems to have raised a few eyebrows. But mostly, the results of the study, while extremely valid and helpful in framing issues of cyber-crime, only tell us something we already know – organized criminals, mostly from Eastern Europe, are stealing veritable tons of online banking […]

Phishing Officially Commoditized

As if it should be at all surprising, word from Gartner – phishing is ubiquitous, to the extent that attackers are aiming their campaigns at stealing smaller amounts of money from more people, a sure sign that competition in the field, and legitimate organizations’ response efforts to such fraud are increasingly shaping the makeup of […]

Job Cuts Leaving IT Systems Open to Attack

A security team’s biggest fear is an attack carried out by a knowledgeable insider, and with the economy driving job cuts within many organizations, those worries are being realized in the form of discharged workers who retain access to their former employers’ IT systems, according to a new survey. With jobs walking out the door, […]

Sophos: We’re Winning via Simplicity, Integration

As organizations deal with the confluence of shrinking IT budgets and scaling malware threats, they’re becoming even more dependent on endpoint security providers and the vendors’ ability to integrate important management features into their products, according Steve Munford, CEO of Sophos, one of the fastest growing companies in the space. Industry analysts may be pushing […]

Ghostnet Botnet Fed by Rudimentary Toolkit

The Ghostnet botnet attack that has successfully exploited computer systems within government networks around the globe is being driven in part by an easy-to-use malware authoring toolkit that allows for simple and rapid propagation, researchers contend. Ghostnet, which was discovered by a group of college researchers in Canada and first reported last week, has purportedly […]

Spam in the Neighborhood

It seems like everyone is putting out their spam stats this week… It was inevitable that mass mailers would begin using more localized information to target their spam at end users, if you think about it they’ve already been doing that for a long time, depending on what language the messages display when they arrive […]

The Confounding Case of Conficker

An interesting bird this Conficker. A botnet, a worm, a USB infection… a media darling and technological masterpiece, yet, a wraith whose true intentions have yet to have been laid bare. An April Fools’ Day joke punch line undelivered. It’s been a real soap opera, right? Everyone in the security community is already completely burned […]