How prepared are you for a data breach? With the threat environment growing more complex, and the rise in advanced...
Dynamic malware reverse engineering helps forensic analysts and reverse engineers gather quick data points such as callout domains, file download...
Cyber security remains the #1 priority for IT security executives and practitioners in 2012 for good reason. With cyber-attacks on...
Poison Ivy is older than the iPhone, Windows Vista, the Nintendo Wii, and Twitter, yet it remains one of the...
The talk was presented on October 23, 2014 at SECURE 2014 - an IT security conference organized by NASK and...