I believe that most infosec professionals have, at one time or other, wished they could fight back when some of the resources they are tasked with protecting came under attack by hackers.
The EU cyber security Agency ENISA is launching an in-depth study on 30 different digital traps or honeypots that can be used by CERTs to proactively detect cyber attacks.
It might seem like a strange question, but I wonder how many readers are running a honeypot network in their infrastructure? If youíre not then let me be the first to say that you really should.
Ghost is a honeypot for malware that spreads via USB storage devices.
Just as the original spam Ė the tinned meat of 50 years ago - prompted people to wonder just what it contained, so too does the spam of the internet age.