Attack Analysis

Phone Motion Sensors: The New Attack Vector
Quite likely, this subterfuge attack, utilizing one of the more clever methods to evade detection to date, is the new attaque-du-jour ...

Proof(s)
Kevin Hartnett, Senior Writer at Quanta Magazine, expounds on the notion of formal code verification when utilzied to provide assurance of attack-proof code... Similar to unsinkable ocean liners, or truly attack-proof? Or, ...

Six Years The Lurker
Illustration from the Kaspersky Labs Document. Dan Goodin, writing at ArsTechnica, provides us with the surreptitious history of the malice-filled code-miscreant APT monikered Slingshot; of which, is apparently an alternatative mwthod of ...