In a previous column, I wrote about how evasive malware has become commoditized and described how the techniques being used in any given piece...
Hi, what are you looking for?
In a previous column, I wrote about how evasive malware has become commoditized and described how the techniques being used in any given piece...
If You Find Yourself Frequently Blaming Users for Successful Attacks, You Know Your Security is Not Working
Although the U.S. Congress must have designated literally thousands of commemorative days, weeks and months, I’m a bit partial to this month’s designation, National...
Whenever someone wants to invoke a hacker for any purpose, we usually get some (stock photography) image of a lone, hooded malware author bent...
Rather than some technical development, I was recently intrigued by something more “social” in nature, specifically the important levels of trust so many companies...
You Can Only Detect Something as Malicious if It’s Malicious at the Time You Are Looking at It
At a recent industry conference I heard some commentary about the “disappearance” of ransomware, but I’m here to assure you that that isn’t the...
When I first started analyzing malware we stored it on floppy disks, so I know old malware when I see it. And, oddly enough,...
I’ve been deconstructing malware for over 20 years, and it turns out I’ve chosen a profession where it’s hard to feel in a rut...
The Necurs Botnet Has a Modular Architecture, Which Allows it to Remain Agile and Switch the Distribution TypeBased on historical patterns and recent activity,...
While "cryptojacking"— whereby a website visitors' CPU is "borrowed" to mine for cryptocurrency — has been grabbing headlines with its rapid growth, I've read...
Even though I've been analyzing malware for the past 20 years, I do understand that internet security is not merely a technical problem, but...