no-image

Lab Matters – Are we up to a brighter future?

Many security technologies rely on blacklisting malicious or suspicious files or applications in order to prevent users from running them. But that approach can have its limitations, and theidea of whitelisting applications and safe files has taken hold recently. In this video, Vladimir Zapolyansky talks about the benefits of application whitelisting, the way that the technology works and how it can help users protect their PCs more effectively. Read Full Article

no-image

Amazon S3 exploiting through SpyEye

Many Cloud Computing providers offer gigabytes of storage for free, and the cybercriminals use to maintain and spread malware of all the kind. At the same time, many legitimate services are not free, but are still very attractive to cybercrime gangs. In the case of Amazon, Amazon Simple Storage Service (Amazon S3) does the trick. Read Full Article