September 19, 2016 New Google API Will Securely Verify Chrome Devices 2 min read - The new Google API allows a network service to obtain a hardware-backed cryptographic guarantee of the identities of a device and the user accessing it.
Mainframe August 29, 2016 The Increasing Dangers of Code Hooking 2 min read - Cybercriminals use code hooking to intercept OS function calls to alter or augment their behavior. The technique is becoming more popular and dangerous.
April 21, 2016 OS X Roundup: The Good, the Bad and the Ugly 2 min read - There has been a lot of news regarding OS X recently, and it runs the gamut from solid security progress to more alarming vulnerabilities.
March 7, 2016 Firefox OS Reinvented for the Internet of Things 2 min read - Mozilla is reinventing its Firefox OS so it can act as a network for the Internet of Things (IoT). Several projects hope to further this aim.
Malware June 4, 2015 Detecting and Analyzing Kernel-Based Malware 3 min read - The intricacies of kernel-based malware make it difficult for security teams to identify potential problems, but the task is not impossible.
Risk Management July 1, 2014 3 Security Best Practices for Online Consumers 5 min read - Three simple security best practices that consumers can employ to protect themselves from phishing efforts and other malicious attacks on the Internet.
Endpoint June 25, 2014 PC-Grade Malware Going Mobile 3 min read - The discovery of the mobile Trojan SVPENG targeting Russian banks has signaled a significant advancement in the sophistication of mobile malware.
Banking & Finance February 15, 2012 Merchant of Fraud Returns: Shylock Polymorphic Financial Malware Infections on the Rise 2 min read - Shylock, a type of financial malware, is on the rise because of its ability to avoid detection after it has infected systems.