Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

Microsoft’s Big Bucks For Bugs Ups The Ante

A  Posting from Dark  Reading in there Application Security section: When Microsoft senior security strategist Katie Moussouris was asked two years ago whether Microsoft would ever consider a bug bounty program of its own, she left the door open ever so slightly on whether the software giant would abandon its longtime philosophy of not paying […]

‘BinaryPig’ Uses Hadoop To Sniff Out Patterns In Malware

A  Posting from Dark  Reading in there Threat Intelligence section: As the menagerie of malware collected by security firms continues to multiply, researchers are looking for new ways to analyze the massive data sets to find interesting information in their malware zoos.  At the Black Hat Security Briefings in late July, one trio of researchers […]

Microsoft’s Big Bucks For Bugs Ups The Ante

A  Posting from Dark  Reading in there Application Security section: When Microsoft senior security strategist Katie Moussouris was asked two years ago whether Microsoft would ever consider a bug bounty program of its own, she left the door open ever so slightly on whether the software giant would abandon its longtime philosophy of not paying […]

‘BinaryPig’ Uses Hadoop To Sniff Out Patterns In Malware

A  Posting from Dark  Reading in there Threat Intelligence section: As the menagerie of malware collected by security firms continues to multiply, researchers are looking for new ways to analyze the massive data sets to find interesting information in their malware zoos.  At the Black Hat Security Briefings in late July, one trio of researchers […]