Temple University

Summary Week 9 and New Article

Malware infection is a very common attack vector utilizing various types of malware with common examples being Trojans and Polymorphic malware. Every organization should have a plan in place to handle an injection or infection of their systems to repel the malware attack.  This plan will enable cyber security professional or information security engineers to triage or resolve disruptions to the services being attacked.   SANS has a great guide which provides succinct Incident Handling Processes: preparation, identification, containment, eradication, recovery, and lessons learned.

In the news: http://www.databreachtoday.com/cia-directors-aol-email-account-reportedly-hacked-a-8605

U.S. law enforcement agencies are investigating reports that the personal email account of Director of the Central Intelligence Agency John Brennan was hacked by an American teenager and that personal information for some top U.S. intelligence and national security officials was stolen in the data breach and leaked online.

Leave a Reply

Your email address will not be published. Required fields are marked *