This post first appeared at Policy@Intel. The Information Sharing and Analysis Organization Standards Organization (ISAO SO) held its Third Public Forum on May 18–19 in Anaheim, California. More than 100 participants from academia, government, and industry sectors, including multiple participants from Intel, assembled to discuss the initial drafts recently published by the ISAO SO and […]

Did you feel the seismic shift this week as most families went from a school to a summer schedule? The excitement is palpable. A sense of levity has permeated every nook and cranny of my teenager’s world while a sense of panic is slowly rolling into mine. Summer signals sand, surf, and—let’s be honest—far more […]

Do you remember the first time you posted on social media? Maybe it was a blog on LiveJournal or an album of prom pictures on Facebook (bet that’s private now). If you’re like me, pressing that ‘share’ button probably felt a little scary. Who can actually see this stuff? Where does it go? As our […]

The popularity of Android devices and applications makes it a target for malware and other threats. This post is the first in a short series on Android application security. Similar to its use for web applications, penetration (“pen”) testing is a part of developing mobile applications. We will discuss in detail the process for performing […]

JS/Nemucod is the detection name given to a family of malicious JavaScript downloaders that have appeared in spam campaigns since last year. They usually arrive as an email attachment, embedded in a ZIP archive, and pretend to be an invoice, a delivery notice, a resume, anything that may seem harmless and can be used as a social engineering […]