Author: Brian Laing

Malicious links are not new, but they continue to plague us. Research shows that a significant number of people will click on a link in an email, web page, or document without taking a second thought, and all too often, end up infecting their device...

Drive-By Downloads are one of the most common methods used by cybercriminals to install malware and gain unauthorized access to your device. To protect yourself from these dangerous attacks, it’s critical to know how they work, and what steps you can take to thwart them. What...

End-to-end malware analysis helps provide protection from infected objects residing on or flowing from all applications (email, websites, mobile, etc.) and all endpoint device types (Windows, Mac OS X, Android, iOS). Lastline’s proven integration with Carbon Black is assisting numerous organizations with realizing this important...

Cybercriminals commonly use malicious emails to deliver malware, including pernicious code that performs MitB (Man-in-the-Browser) attacks.   Although MitB threats are not new, cybercriminals are constantly developing new versions designed to defeat secure email gateways, the latest and most secure browsers, and other security controls. To...

Infected PDF files continue to plague security personnel responsible for detecting and containing malicious email attachments. Cybercriminals use many different tactics to breach an organization’s network defenses, and delivering infected PDF files, typically via email, remains a very common and dangerous threat. Unfortunately, Secure Email Gateways...

Corporations take extensive measures to monitor, detect, and stop malicious code from entering the enterprise via the Internet. But what about detecting malware that walks through your enterprise's front door and into your network—hidden in the devices that your employees, contractors, or delivery personnel are...

There’s a lot of buzz these days about cyberattack prediction. The U.S. federal government is keen to develop technologies that will not just detect but accurately predict cyberthreats. But they aren’t alone. The commercial sector is also ramping up their interest in cyberattack prediction. Although it...