A worthy upgrade: Next-gen security on Windows 10 proves resilient against ransomware outbreaks in 2017

Read more A worthy upgrade: Next-gen security on Windows 10 proves resilient against ransomware outbreaks in 2017

WannaCrypt ransomware worm targets out-of-date systems

Read more WannaCrypt ransomware worm targets out-of-date systems

Detecting and mitigating elevation-of-privilege exploit for CVE-2017-0005

Read more Detecting and mitigating elevation-of-privilege exploit for CVE-2017-0005

Reverse engineering DUBNIUM – Stage 2 payload analysis

Read more Reverse engineering DUBNIUM – Stage 2 payload analysis

Reverse-engineering DUBNIUM’s Flash-targeting exploit

Read more Reverse-engineering DUBNIUM’s Flash-targeting exploit

Reverse-engineering DUBNIUM

Read more Reverse-engineering DUBNIUM

Understanding type confusion vulnerabilities: CVE-2015-0336

Read more Understanding type confusion vulnerabilities: CVE-2015-0336

Creating an intelligent “sandbox” for coordinated malware eradication

Read more Creating an intelligent “sandbox” for coordinated malware eradication

RSA Conference 2014: Microsoft’s Trust Principles


The keynote sessions at the
RSA Conference are always compelling. This year’s presentations at the Moscone Center in San Francisco have been some of the best I’ve seen, with a strong focus on government surveillance programs and what they mean for the IT industry.

In his keynote speech, Trustworthy Computing Corporate Vice President, Scott Charney, discussed “Conundrums in Cyberspace”, along with his take on the sometimes conflicting roles of government as it relates to the internet.  See more >>

Read more RSA Conference 2014: Microsoft’s Trust Principles

A coordinated approach to eradicating malware

Read more A coordinated approach to eradicating malware