Paper: Dylib hijacking on OS X

Patrick Wardle shows how OS X is also vulnerable to once common Windows attacks. (0 comments)

19 March 2015

Will DIME eventually replace email?

Protocol has all the advantages of email, yet is orders of magnitude more secure. (0 comments)

12 March 2015

Paper: Windows 10 patching process may leave enterprises vulnerable to zero-day attacks

Aryeh Goretsky gives advice on how to adapt to Windows 10's patching strategy. (0 comments)

12 March 2015

The ghost of Stuxnet past

Microsoft patches .LNK vulnerability after 2010 patch was found to be incomplete. (0 comments)

11 March 2015

Virus Bulletin seeks hackers, network researchers for VB2015

One week left to submit an abstract for the 25th Virus Bulletin conference. (0 comments)

06 March 2015

Canadian firm fined $1.1m for breaching anti-spam law

First success story for long-awaited CASL. (0 comments)

06 March 2015

VB2014 paper: Leaving our ZIP undone: how to abuse ZIP to deliver malware apps

Gregory Panakkal explains that there are different ways of looking at APK files - and that sometimes that can have unintended consequences. (0 comments)

05 March 2015

FREAK attack takes HTTPS connections back to 1990s security

Golden keys from the (first) crypto wars have come back to haunt us. (1 comment)

04 March 2015

Paper: Script in a lossy stream

Dénes Óvári explains how to store code in lossily compressed JPEG data. (2 comments)

2 March 2015

TorrentLocker spam has DMARC enabled

Use of email authentication technique unlikely to bring any advantage. (0 comments)

02 March 2015