The Inspector is an offline discovery tool, taking a network feed from a mirror port on a switch, and examining traffic for patterns matching suspicious behaviour. Trend Micro identifies this “listen-only inspection of all network traffic” as a key feature of its system as it reduces strain on devices, which can occur with in-line products and end-point security programs.
Robert Layton |
23 Sep |
Read more
The value of personal data is often underestimated by the general public; the risks are commonly ignored on social media sites, especially by those in their teens or twenties.
Robert Layton |
13 Jul |
Read more
One of the cornerstones of policing is the ability to identify perpetrators to bring them to justice.
Robert Layton |
13 Oct |
Read more
Cybercrime today is run as a business, with ROI, user support, clear hierarchies and business plans. One aspect of this type of business is the high rate of innovation, leading to new technical advances in cybercrime proliferation.
Robert Layton |
07 Sep |
Read more
Recent publicity for online hacking groups such as Anonymous and Lulzsec has seemed to show that nobody is immune from attack on the Internet. Once targeted, it seems that these groups are capable of breaching security systems and retrieving data, including identity information, from the most secure systems.
Robert Layton |
13 Aug |
Read more