Disarming Exploits: Stop Trying to Make “Weaponized” Cyber Happen

|
Everywhere I look, I’m constantly besieged with news stories using terms like “weapons-grade exploits” and “weaponized malware” to describe the latest malware outbreak. The media’s fixation on categorically applying a militaristic view on cyber capabilities leads to an industry dominated by warfare terminology; if everything is a weapon, then its ... Read More

Disarming Exploits: Stop Trying to Make “Weaponized” Cyber Happen

|
Everywhere I look, I’m constantly besieged with news stories using terms like “weapons-grade exploits” and “weaponized malware” to describe the latest malware outbreak. The media’s fixation on categorically applying a militaristic view on cyber capabilities leads to an industry dominated by warfare terminology; if everything is a weapon, then its ... Read More

How to Implement an Anti-Malware Scanning Interface Provider

|
The Antimalware Scan Interface (AMSI) is Microsoft’s generic application programming interface for software applications to integrate with any installed antivirus software on Windows 10. Very little has been written on actually implementing an AMSI provider, so we’re going to change that ... Read More

Back to School with TEALS

TEALS is a program dedicated to preparing the world’s future innovators by immersing students in computer science at a young age. The ultimate goal is to hone and refine the critical problem-solving skills of our future generations. Just as we learn physics to understand the natural world, we must study ... Read More

Internet of Things: Building Secure Devices

As the Internet of Things (IoT) continues to proliferate, it’s up to developers to build devices that don’t sacrifice consumer security or privacy. If developers take charge of building security into their IoT devices from the start, rather than as an afterthought, we’ll all win: security practitioners, manufacturers, and consumers ... Read More

Internet of Things: Three Steps to Protect Yourself

The commoditization of putting a chip in things has created an explosive growth of smart devices and left us surrounded by a web of insecure things. So, what steps can you take to protect yourself as our daily lives get assimilated into the Borg universe? ... Read More

Internet of Things: Questions You Should Ask

When it comes to the Internet of Things, the smarter the device, the dumber the security vulnerabilities. Here are the questions you should ask yourself before making your next IoT purchase ... Read More