Examination of some of the security changes in Windows 8 and what they mean to users. Defender of the faith. Giving rootkits the boot, Replacing BIOS firmware with UEFI, Boot Loader is 1st disk to…
FUD and Blunder: Tracking PC Support Scams. The authors conclude that legitimate marketing needs to educate customers, sellers and marketers and do a better job of keeping business models distinct…
To store their payload and configuration information, malware families employ a range of mechanisms such as hidden storage to counteract forensic analysis. The paper details the use of this approach…
This paper considers the evolution of the FUD and Blunder approach, PR-oriented infrastructure, meetings with remarkable scammers, points of contact between the support scam industry, where the…
The article describes: 1) Interesting technical characteristics of the OSX/Flashback threat, particularly its method of spying on network communications and its algorithms for generating domain names,…
The paper discusses BYOD aspects: Pros and cons, an overview of all kinds, the apps problem, potential attack vectors on BYOD and data leakage through, advice and implementing a device management…