zombie


All one has to do is take a look at the latest headlines to know that Distributed Denial of Service (DDoS) attacks are becoming increasingly commonplace in the enterprise environment. But that doesn't make them any less of a threat. In fact, quite the opposite. These days, powerful DDoS attacks have the ability to shut down dozens of servers, causing hours of lost service time, while damaging brands and costing victim companies millions in lost revenues. And many of these attacks now come equipped with stealth capabilities that can easily dodge... [Read More]
by RSS Stefanie Hoffman  |  Apr 10, 2014  |  Filed in:
Hey all you Walking Dead fans, all 20 million of you! Surely October brings the perfect atmosphere for indulging in some quality Zombie cinema. No matter how you get your zombie fix, be it via the old fashioned television or on your newfangled mobile device, being secure while reveling in the adrenaline pumping, heart stopping greatness of the Walking Dead is incredibly important. You may not know this but you might have a zombie computer. Flickr A zombie computer allows an unauthorized person to gain control over another user's computer.... [Read More]
by RSS Michael Perna  |  Oct 24, 2013  |  Filed in: Industry Trends
It's a little known fact that the month of May is actually Zombie Awareness Month. While many pay homage with movie marathons and even reenacting zombie activities (well, some zombie activities) during pub crawls and horror conventions, we thought we’d give you some life-saving details on how to stop a different kind of zombie… The Zombie Computer! While an infected zombie computer won't eat your brains for sustenance, they can still inflict a great deal of pain and misery to computer users. A zombie computer allows an unauthorized person... [Read More]
by RSS Rick Popko  |  May 20, 2010  |  Filed in: Security Research