The Latest in IT Security

Posts Tagged ‘Conference’

#topics arising at the #conference that were most interesting included APT research and threat intelligence, Linux (and embedded) as a targeted platform in much higher prevalence, and Patrick Wardle’s talk on Apple’s security technology Gatekeeper flaws. Costin, the mysterious spook, and Juan’s #talks and papers reflected on the threat intelligence industry as a transformation. One […]

Read more ...

28
Sep
2015

At this time of year I’m usually getting ready to travel to #virus bulletin, maybe the year’s most important #conference for an anti-#malware researcher. The agenda looks as good as ever, though, with a keynote from Ross Anderson to kick things off. Other presentations that caught my eye included Does prevalence matter? Ranking anti-malware products […]

Read more ...

A design #flaw in the x86-#processor #architecture dating back almost two decades could allow attackers to install a #rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security products. The vulnerability stems from a feature first added to the x86 architecture in 1997. It was disclosed […]

Read more ...


Categories

TUESDAY, MAY 07, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments