Malware September 4, 2015 An Example of Common String and Payload Obfuscation Techniques in Malware 9 min read - IBM X-Force researcher Igor Aronov examines some common techniques used by malware authors to complicate dynamic (automated) and static (manual) analysis.
September 2, 2015 Research Funding May Help Secure Almost Everything in the IoT 2 min read - We may still be years away from completely smart homes and cities, but a set of research projects may help better secure the Internet of Things (IoT).
Data Protection August 26, 2015 Blurred Lines: Researching the Ashley Madison Data 4 min read - Ashley Madison's recent data dump provided security researchers with a treasure trove of information — but is looking into the breach completely legal?
June 12, 2015 Mozilla Increases Top Rewards in Bug Bounty Program to $10K 2 min read - Mozilla said it was dramatically increasing what it pays researchers who find major flaws in Firefox and other products as part of its bug bounty program.
Malware June 4, 2015 Detecting and Analyzing Kernel-Based Malware 3 min read - The intricacies of kernel-based malware make it difficult for security teams to identify potential problems, but the task is not impossible.
May 18, 2015 United Airlines Launches Bug Disclosure Program to Bolster Software Security 2 min read - United Airlines has become the first company in the airline industry — and one of the few non-software vendors — to launch a bug disclosure program.
Banking & Finance June 9, 2014 ZeuS.Maple Variant Targets Canadian Online Banking Customers 5 min read - Trusteer security research team identified a series of attacks carried out by a new ZeuS.Maple variant that targets customers of leading Canadian banks.