Cuckooware
Ever try to download a known application from the net and got something that was completely different than what you
Read MoreI can't believe that came from your mouth!
Ever try to download a known application from the net and got something that was completely different than what you
Read MoreCode signing is dead. Long live code signing. You make software that you want people to trust enough to install
Read MoreCode signing, the act of having a third party certify that compiled code doesn’t change, is basically worthless. It was
Read MoreGoogle has spent the past several months executing a multi-pronged attack to take down Adware companies that distribute spyware. Why?
Read MoreEver been trapped in a conversation with someone about a topic that you absolutely don’t care about? A conversation that
Read MoreWikileaks has a whole lot of lapdogs in the press. So anything Wikileaks wants to promote in the news pretty
Read MoreSites like Buzzfeed and Answers.com compile lists of drivel with fantastic titles and try to entice people to click on
Read MoreI got a late night email exchange from the administrators of 420magazine.com, a website that I reported had been delivering
Read MoreI use the Invincea Research Edition in my day-to-day job investigating malware. I found this humorous exploit uploaded on the
Read MoreI was investigating a malware file being hosted at Krypt.com earlier today. After a host gets infected, it reaches out
Read MoreThere are very few new technologies in the market that are poised to make a substantial impact on how endpoints
Read MoreLike most internet users, I rely on Drudgereport.com to aggregate my news from around the country and world. This morning
Read MoreWho’s up for more Stuxnet-style cyber attacks against Persia? Me, that’s who. Watch the latest video at video.foxnews.com From FoxNews
Read MoreCryptome.Org was compromised by some type of PHP vulnerability, adding a download script to each of its pages on the
Read MoreWay too many of the customers I interact with are still stuck using Windows XP, an operating system that came
Read MoreOn of the most effective ways to distribute malware to unsuspecting users is to poison the advertising banners used by
Read MoreI have spent lots of hours in the Analyst’s chair pouring over IDS/proxyserver/SEIM logs and alerts, and trying to piece
Read MoreI haven’t written very much about the Conficker virus on this page except to note that it caused France to
Read MoreThe guys who write viruses and malware aren’t the mischief makers or yore. The bad guys have figured out that
Read MoreMikko Hypponen of F-Secure is in this video below describing some of the coolest threats discovered on the Internet in
Read MoreThere are lots of websites out there taking advantage of the Bhutto Bombing to spread malware and trojan horse attacks.
Read MoreKiltak at [GAS] Geeks Are Sexy has invited me to guest bog at his site! You can check out how
Read More