News Categories
(34)Malware (39)Malicious emails (11)Web 2.0 (24)Facebook (22)Social Networks (44)Spam (2)Defensio (1)Comment Spam (15)Phishing (9)Web spam (4)Click-jacking (38)Compromise (20)Analysis (38)Exploits (14)Research (3)Presentations (3)Conferences (4)security conference (9)Mass Injection (10)Rogue AV (4)Blackhat SEO (2)Neosploit (23)Targeted attacks (7)Video (14)Zeus (5)Microsoft (4)Monthly Reports (1)twitter (3)Google (18)Vulnerabilities (9)Adobe (12)Java (4)Mobile (4)Apple (1)hacked (1)TAB (1)Black Hat USA 2011 (1)Google+ (20)0-day (1)CVE-2010-2884 (1)CVE-2011-1255 (1)Worm (14)Blackhole exploit kit (1)Incognit Exploit kit (2)Tuesday Patch (6)APT (6)Typosquatting (3)Vulnerability Analysis (1)CVE-2011-3402 (4)Web Research (4)Predictions (3)Adult (5)News (3)Black Hat SEO (6)Data loss (8)Scam (1)QR codes (6)Twitter (1)CVE-2012-0003 (1)CVE-2011-3389 (1)CVE-2012-0004 (1)Phoenix Exploit Kit (1)CrimePack (3)Reverse Engineering (2)Captcha (1)Valentine's day (2)Kelihos (1)SC Magazine Award Winner (1)Wordpress (1)MS12-010 (1)CVE-2012-0002 (1)Infosec (2)CVE-2012-0507 (8)Toolkits (1)Skywiper (2)Flame (1)Flamer (2)Passwords (1)freedom of expression (1)censorship (2)Plugins (3)Malvertising (14)Exploit (1)CVE-2012-1723 (1)CSI (2)ThreatSeeker (2)Adventures in Spam (1)CVE-2012-4681 (1)LBS (2)RAT (1)module Apache/2 (1)Cyber Monday (1)Black Friday (1)Pastebin (4)CVE-2012-4792 (1)iPad (1)super bowl (1)iPhone (2)iOS (4)Spear Phishing (1)Threat Report (3)ThreatScope (1)Dynamic DNS (1)China (1)SSL (1)APT1 (2)DLP (3)Hack (1)CVE-2012-4969 (2)threat lifecycle (1)ThreatSeeker Network (1)ACE (10)exploit kit (1)blackhole (2)Black Hole (1)DNS poisoning (1)RedKit Exploit Kit (4)exploit kits (1)threat stages (1)Certificates (1)Topical (1)Waterhole (1)CVE-2013-2463 (1)Neutrino exploit kit (1)CVE-2013-2473 (1)CVE-2013-3893 (2)Collective Threat Intelligence (1)CVE-2013-3963 (1)Targeted Attack (3)Advanced Malware (1)CVE-2013-3897 (1)Tor (5)cyber-crime (1)Mevade (2)Ransomware (3)Social Engineering (1)CookieBomb (2)LinkedIn (1)CVE-2013-3906 (2)Pony (3)Cryptolocker (2)Upatre (1)application telemetry (1)meta-data (3)dr. watson (1)windows error reporting (1)big data (2)data theft prevention (1)DTP (1)telemetry (2)CVE-2014-0322 (2)MSIE 0-day (1)Deputy Dog (1)Ephemeral Hydra (1)CVE-2013-0074 (1)CVE-2013-3896 (1)Silverlight (2)crash reports (1)POS (1)anomaly detection (1)goon (4)angler (1)ru:8080 (1)magnitude (3)flash (1)CVE-2013-2465 (1)malicious iframes (1)FIESTA (1)Exploits Kit (1)iframe (3)CVE-2014-0160 (2)OpenSSL (3)Heartbleed (3)Citadel (2)CVE-2014-1776 (1)VGX.DLL (1)necrus (1)cutwail (2)gameover (3)vulnerability (3)zbot (1)control panel (1)carberp (1)zberp (1)Caphaw (2)Nuclear exploit kit (1)Shylock (1)Dragonfly (1)Zeus PIF (1)bitly (1)fraud (2)RIG Exploit Kit (1)POS malware (1)Point Of Sale Malware (1)Ukraine (1)Russia (1)Shellshock (1)CVE-2014-6271 (1)poodle (1)cve-2014-3566 (1)sslv3 (1)Ebola (1)CVE-2014-4114 (1)CPA (1)Regin (1)CVE-2015-0311 (1)CVE-2015-0235 (1)linux (1)GHOST (1)CVE-2015-0072 (1)Internet Explorer (1)XSS (1)IE (1)TorrentLocker (1)Product Information (1)Money Laundering (1)APSA10-05 (1)Skype spam
RSS Feed
News
Jul
16
Braaaaaaaaaaaiiiiiiiiiiiiiins!
Posted by RM on 16 July 2012 10:53 PM

Here in Websense's own backyard, the 2012 San Diego Comic-Con has just folded up its superhero cape after four days of workshops, film screenings, panel discussions, and collectible exhibits. Beginning in 1970 with a one-day event and 145 attendees, Comic-Con now caps attendance at about 130,000 and brings in about $162.8 million to our local economy.


Judging by some of the costumed attendees we spotted downtown over the weekend (at least we hope that's what they were), zombies are an increasingly popular theme. As we observed the undead shuffling around near the Convention Center in search of human brains, we couldn't help but reflect on some obvious parallels between the zombie apocalypse and the security threats we face down every day here at Websense.

 

Night of the Living Bots! Compromised hosts as digital zombies! 

 

Think about it:

 

  • Zombies eat brains; in the security world, “brains” are confidential/proprietary data, customer data, and secrets.
  • Zombies take over their hosts, so do bot networks.
  • Zombies attack in hordes, just like huge scale SPAM and DoS attacks.

 

Coincidence?  We think not.

 

Fortunately, the world has been dealing with the zombie threat long enough to have established some Best Practices from the movie "Zombieland" to help survive an attack. These also have parallels in the security arena.

 

  • Rule No. 1:  Cardio.  "Zombies lead a very active lifestyle. So should you." The fitter you are, the better your chances of outrunning the undead. Websense pumps it up with up-to-the-millisecond proactive classification in real-time, keeping you a step ahead of security threats--always the safest place to be.
  • Rule No. 2:  The Double Tap.  "Just because the zombie is down is no reason not to finish it off." The Websense double tap is to classify and block both outbound malicious traffic and outbound proprietary data. Threats are down and OUT.
  • Rule No. 3:  Beware of Bathrooms. "Zombies smell when you are at your most vulnerable." Websense classifies and blocks cesspool websites based on poor web reputations, keeping you, your systems and your data clean and minty fresh.
  • Rule No. 4:  Avoid Strip Clubs. "Hang out in sleazy places, and bad things are likely to happen."  Websense goes there so you don't have to, hanging out where malware does in order to classify objectionable content before it finds you.
  • Rule No. 5:  The Buddy System. "Why don’t zombies attack each other? Possibly a herd instinct keeps them safe and you should do the same." The ThreatSeeker network has your back.

 

Beyond the established and internationally-recognized canon of zombie fighting rules, we've added a few new wrinkles. Bona fide professional zombie hunters Columbus, Tallahassee, Wichita, and Little Rock are available through Websense CSI to help you determine if you are under a zombie attack, and more important, to help you fight back and survive. ThreatScope, our very own version of Pacific Playland, lures the zombies out to play and reveals their true flesh-eating colors. Check out a sample report that helped avert a zombie apocalypse! 

 

Another essential rule is "Get a ...gnarly... partner," and nobody fills that bill better than Websense.

 


Read more »