Recent Automobile Security Vulnerabilities Create ITSec Unrest

By: February 26, 2015

Recently, a second vulnerability was discovered in BMW’s ConnectedDrive system. The feature that was exploited was the ability to request a remote unlock of your car from your smartphone should you get locked out. However, the traffic to and from… Read More

Point-of-Sale Security for Dummies: Understanding Advanced Threats and Attacker Motivation

By: February 25, 2015

(Today, in part three of our Point-of-Sale Security for Dummies blog series, we take a look at advanced attacks and attackers’ motivation. In part one, we addressed the current state of POS security. In part two, we tackled 14 ways… Read More

Screenshot Demo: “Rewind the Tape” to Detect Ventir Dropper Malware on Mac OS X

By: February 24, 2015

Today’s screenshot demo is going to give you a quick glimpse into some of the visibility you get with Carbon Black on Mac OS X. This post touches on some key points to how quickly you can “rewind the tape”… Read More

As the ‘Ship’ Sinks, What Are Your Priorities?

By: February 20, 2015

Part 1: Cyber Security is now a “Sinking Ship” Part 2: In a Sea of APT “Icebergs,” Are You Thinking Big Enough? We’ve established in the first two posts in this blog series that you can’t save the ship, so… Read More

Customer Use Case: “Searching for Zeus, I found so much more…”

By: February 19, 2015

(Editor’s Note: This post was written by an information security engineer who works for a Bit9 + Carbon Black customer. The engineer submitted this post after “hunting for evil” using Carbon Black and wanted to share the information with the… Read More

‘Equation Group’ Report Reveals Something We Already Knew

By: February 18, 2015

According to a new report from Kaspersky, the ‘Equation Group’ made a breakthrough by figuring out how to lodge malware inside the firmware that’s launched every time a computer is turned on. Firmware, as we know, is very valuable real… Read More