In early June, the news broke that the Angler exploit kit was no longer the method of choice for malware delivery, especially ransomware. According to SC Magazine, attackers have now switched to the Neutrino exploit kit, perhaps in an effort to avoid detection.
In the modern business world, applications are the vehicles for getting stuff done. This has become even more apparent as mobile technology enables us to be more productive in more places than ever before. But despite all the buzz about security in the mobile world,...
Before the days of PowerShell Test-NetConnection, we had many different command-line tools we could choose from to troubleshoot various network connectivity issues. We had ping for testing ICMP echoes and replies; tracert to see where our packets might be getting...