How to Implement an Anti-Malware Scanning Interface Provider

/
The Antimalware Scan Interface (AMSI) is Microsoft’s generic application programming interface for software applications to integrate with any installed antivirus software on Windows 10. Very little has been written on actually implementing an AMSI provider, so we’re going to change that ... Read More

How to Implement an Anti-Malware Scanning Interface Provider

/
The Antimalware Scan Interface (AMSI) is Microsoft’s generic application programming interface for software applications to integrate with any installed antivirus software on Windows 10. Very little has been written on actually implementing an AMSI provider, so we’re going to change that ... Read More

Unintended Consequences: The Fallout of Vulnerability Hype

2018 started off with a bang as the information security community had a meltdown over the ‘spectre’ of a new class of vulnerabilities which affect the core of every computing device: the central processing unit (CPU). Once news of the vulnerabilities bled into traditional news outlets, users rushed to protect ... Read More

Unintended Consequences: The Fallout of Vulnerability Hype

2018 started off with a bang as the information security community had a meltdown over the ‘spectre’ of a new class of vulnerabilities which affect the core of every computing device: the central processing unit (CPU). Once news of the vulnerabilities bled into traditional news outlets, users rushed to protect ... Read More

Back to School with TEALS

TEALS is a program dedicated to preparing the world’s future innovators by immersing students in computer science at a young age. The ultimate goal is to hone and refine the critical problem-solving skills of our future generations. Just as we learn physics to understand the natural world, we must study ... Read More
Windows 10 Parallel Loading Breakdown

Windows 10 Parallel Loading Breakdown

One of the unnoticed improvements of Window 10 is the parallel library loading support in ntdll.dll. This feature decreases process startup times by using multiple threads to load libraries from disk into memory. However, there are a lot of hazards when it comes to parallel loading and code hooking ... Read More

Internet of Things: Building Secure Devices

As the Internet of Things (IoT) continues to proliferate, it’s up to developers to build devices that don’t sacrifice consumer security or privacy. If developers take charge of building security into their IoT devices from the start, rather than as an afterthought, we’ll all win: security practitioners, manufacturers, and consumers ... Read More

Internet of Things: Three Steps to Protect Yourself

The commoditization of putting a chip in things has created an explosive growth of smart devices and left us surrounded by a web of insecure things. So, what steps can you take to protect yourself as our daily lives get assimilated into the Borg universe? ... Read More

Internet of Things: Questions You Should Ask

When it comes to the Internet of Things, the smarter the device, the dumber the security vulnerabilities. Here are the questions you should ask yourself before making your next IoT purchase ... Read More