Google's Macintosh Operations Team announced last week the availability of the source code for "Santa," a tool designed for whitelisting and blacklisting binaries on Apple's Mac OS X operating systems.
Virtualized end-user systems and public cloud computing will play a role in nearly every business over the next decade, but applying the disposable philosophy universally in an enterprise environment is beyond risky, when you consider how attacks have changed.
About 50 percent of all software piracy violations found at corporations happen from businesses that are already clients of the software they are accused of stealing. So, what steps should both the software vendor and their customers take to ensure the relationship avoids speed bumps such as software piracy?
Laptop batteries use microcontrollers to tell the lithium battery when it's full and when it needs to be recharged. What's intriguing is that cybercriminals could install malware that would remain on the device no matter how many times you reinstalled the operating system.