January 30, 2013 Tales from the Crypter: Thwarting Malware Obfuscation with Threat Emulation Summary Malware writers employ a variety of specialized obfuscation techniques to render known malware invisible ...
January 2, 2013 Malware Evolution: PC-based vs. Mobile 2012 signified the year where people started seriously thinking about mobile security and asking: how ...