Last month, my colleague Sébastien Duquette detailed the home campaign, a long-lasting operation consisting of compromised web servers running a malicious Apache module named Darkleech (detected by ...
In this guide, we explain what obfuscation does, how obfuscated servers can enhance your digital privacy, and when obfuscation is most beneficial. An obfuscated VPN server uses encryption to scramble ...
Attackers are increasingly changing up the techniques used to obfuscate what their software is doing, with one group hiding parts of their code using a variety of techniques swapped out every 37 days ...
I am the founder and CEO of Apriorit, a software development company that provides engineering services globally to tech companies. Nowadays, cyber attackers are armed with an impressive range of ...
I am not an enemy of proprietary software. That shouldn't surprise anyone, as I used to work for Microsoft, but besides that, I've written heaps of articles and blog posts explaining what I consider ...
Google announced today five new rules for the Chrome Web Store, the portal where users go to download Chrome extensions. The new rules are primarily meant to prevent malicious extensions from reaching ...
Happy to bare - sorry - share all online? Surely one day we'll wish some things were private. Even as post-privacy activists or social media stars. Finn Brunton, co-author of "Obfuscate," on hiding ...
The word 'obfuscate' describes making information unclear or confusing, often intentionally. Originating from Latin for 'to darken,' it highlights how language can obscure truth rather than illuminate ...
Google has banned obfuscated code for Chrome Web Store extensions to reduce policy violations in a move likely to affect cryptojackers. Google’s new restrictions on Chrome Web Store extensions ...