Reverse Engineering Malware — A Look at How the Process Has Evolved
In 1971 the first known instance of a self-replicating "computer worm" was recorded. Creeper didn't harm computers, but it did...
In 1971 the first known instance of a self-replicating "computer worm" was recorded. Creeper didn't harm computers, but it did...
Stealing intellectual property (IP) is big business for cybercriminals, and they often use malware to do it. Many cyberthieves have...
Cybercriminals are motivated by several things, including fun, fame, ideology, revenge, and especially monetary gain. They use many techniques in...
Most current malware attacks use techniques that were created in only the last few years. However, Steganography — “the practice of concealing...
By the end of 2017, 70% of organizations believed that their endpoint security risk had grown significantly over the last...
If your data center tells you they need to re-install the operating system onto one of your servers, there’s a...
In January of this year, the U.S. Department of Homeland Security reported that 247,167 of its employees had their data...
We were sitting around the campfire this week reading the latest Lastline Labs blogs post. We were ignited by some...
With the significant growth of the Android operating system, cybercriminals are increasingly using the platform for malicious purposes, and organizations...
Polymorphic malware has been around since the early 1990s, but it’s still wreaking havoc in our computers and networks. SC...
This is an necessary category.
This is an non-necessary category.