Interview with Ed Skoudis, author of "Counter Hack"
by Mirko Zorz - Tuesday, 18 February 2003.
After that, admins needs to know how to check their systems for anomalous activities. They need to understand how to detect sniffers, rootkits, backdoors, and other tools used by the bad guys.

What is, in your opinion, the biggest challenge in protecting sensitive information at the enterprise level?

The overwhelming flood of patches to fix vulnerabilities is very difficult to deal with. We actually have data glut, with a constant flow of vulnerability notices, threat indications, attack detection, and so on. It's hard keeping up with all of this information, and figuring out what is really important.

What are your future plans? Any exciting new projects?

I'm working on another book. This next tome will be more focused on specific attacks than the last one. I'm pretty excited about it.

Additionally, I write monthly "Crack the Hacker" challenges to test readers' knowledge of handling various computer attack scenarios. I write up a scenario based on some movie theme, and pose various questions at the end. So far, I've written Spider-Hack, Hack to the Future, How the Grinch Hacked Christmas, and many others. They are located at counterhack.net.

Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //