Taking root

We analyzed the statistics we had collected from May to August 2015 and identified three main Trojan families that use root privileges on the device to achieve their goals. Read Full Article

What is a secure OS?

An operating system can be compared to a shield. All additional built-in security capabilities are rivets on the shield. What is more important is the architecture, the principles underlying the OS. This determines whether the shield will be made of paper, plywood or steel. Read Full Article