Security Advice is fundamentally the same

September 9, 2015By Dan Para

Thinking back on the changes in what we like to call the “threat landscape” over the years, a lot has changed. From the days of actual viruses and worms spreading their way through…read more

Compromising Windows via Windows Update Drivers

August 24, 2015By Tyler Moffitt

  While at Blackhat 2015, I saw a very interesting presentation on compromising the Windows Update service (“WSUSpect – Compromising The Windows Enterprise Via Windows Update” – Paul Stone & Alex Chapman). The…read more

What Now After Black Hat 2015?

August 12, 2015By George Anderson

It’s good to see that at last some alternatives to traditional AV endpoint protection are gaining traction. A lot of the questions I was asked at the show were to compare Webroot to…read more

Why are we using biometrics as passwords?

August 10, 2015By Cameron Palan

After seeing a great presentation on newly discovered biometrics/fingerprint vulnerabilities (“Fingerprints On Mobile Devices: Abusing And Leaking”, by Tao Wei and Yulong Zhang) at Blackhat 2015, I have to wonder why we are…read more