In the marketing world, as in most other industries, there are two types of people. There are the complicators. And there are the simplifiers. The complicators can make even the simplest marketing ...
Reverse engineering and tampering attacks threaten every mobile app, yet many apps apply basic code hardening techniques (or none at all!) to defend against these attempts. In fact, research has shown ...
When I first started writing for the Calistogan, the former editor Mike Lynch and I were trying to come up with a name for the column. I had suggested using my motto, "Eschew obfuscation." His ...
COMMENTARY--I can imagine a world where the computers needed no security. Where there were no passwords, no security checks, and no firewalls. Where the computers communicated freely and shared ...
With malware now so common and successful cyberattacks offering potentially high -- albeit criminal -- returns, there is little need for garden-variety hackers to learn how to develop exotic, custom ...
In the new cryptomining module we discovered and described in our previous article, the cybercriminals behind the Stantinko botnet introduced several obfuscation techniques, some of which have not yet ...
I am the founder and CEO of Apriorit, a software development company that provides engineering services globally to tech companies. Nowadays, cyber attackers are armed with an impressive range of ...
Zach began writing for CNET in November, 2021 after writing for a broadcast news station in his hometown, Cincinnati, for five years. You can usually find him reading and drinking coffee or watching a ...
When I first started writing for the Calistogan, the former editor Mike Lynch and I were trying to come up with a name for the column. I had suggested using my motto, "Eschew obfuscation." His ...