Type to search
Analyze a file Free Tools

Blog: Jianpeng's Blog

‹ Blog

Jianpeng Mo
Vice President of Engineering

Jianpeng Mo joined OPSWAT in 2011 and is OPSWAT's Vice President of Engineering. He leads OPSWAT's development teams for device compliance management solutions, MetaAccess, and OESIS Framework. He specializes in developing modern concept products, leading the engineering groups in solving unique and difficult technical problems. Jianpeng received his M.S. from New York University with a major in Electrical Engineering. He has been granted 6 U.S. patents for device encryption, network access control, and vulnerability assessment technologies.

Benny on social media: Twitter / Facebook / LinkedIn

OPSWAT MetaDefender Protects Against Offensive Zero-Day Capabilities

Zero-day attacks are no longer limited to hacker groups and companies; governments have been exploring the use of offensive zero-day capabilities. In fact, state actors, including the U.S., are some of the biggest customers for new zero-day attacks. Recently, the Israel Ministry of Defense expressed interest in advanced vulnerabilities and zero-day exploits R&D for use by its law-enforcement and security agencies, and other countries are almost certainly seeking similar capabilities.

read more

Why Advanced Persistent Threats Are Targeting the Internet of Things

Internet of Things (IoT) cyber attacks are on the rise. How can organizations stop advanced persistent threats targeting IoT devices?

read more

OPSWAT Metadefender Helps Users Assess Trident iOS Vulnerabilities

Two in the iOS Kernel and one in the WebKit, Lookout, and Citizen Lab reported vulnerabilities deemed "Trident" yesterday, heightening concerns over Apple’s security system and sparking discussion.  

The Trident vulnerabilities are zero-day threats that allow hackers to access a victim's personal data via SMS phishing. This means that the target device could be potentially jailbroken, remotely, prompting the hacked device to share its private contents with the attacker. This type of attack is especially dangerous because device owners may not even know that their device has been compromised. These vulnerabilities give attackers access to the device's kernel memory where they can then execute arbitrary code when victims are visiting malicious websites. 

read more

What Can We Learn from Anti-malware Naming Conventions?

Using naming conventions to track the detection of viruses can be difficult because vendors often report the same virus with completely different names. Although this is not always true, it applies to most of the cases we have experienced at OPSWAT. The question is, how similar are the names of viruses used by different vendors and are there any trends in the naming patterns used? 

read more

OESIS is Windows 10 Ready

There was a lot of coverage this week surrounding the new Technical Preview of Windows 10. Microsoft has made some exciting announcements and we are very interested to see what else may be revealed before the public release of Windows 10.

read more

PowerShell vs. PsExec for Remote Command Execution

Monitoring and maintaining large-scale, complex, highly distributed and interconnected systems can be extremely challenging for network administrators. Traditional IT management approaches are ill-equipped to handle the complexity of today's application architectures and deployment environments. It's common that an IT admin would support hundreds of machines in an enterprise network daily, but having to physically run down to each machine individually in order to issue a simple command is not acceptable. Therefore, being able to execute system commands remotely without too much additional pre-configuration is always a welcomed and appreciated solution.

read more

IT Risks of Toolbars

Toolbar add-ons are a type of browser extension that typically provide users with various additional functionalities by adding a bar with several buttons within the browsers, oftentimes along with a search box as well. Toolbars may also have features for altering the user’s homepage, allowing searches of third party sites (e.g. Amazon, eBay, IMDb), and modifying page scripts or the html page display. Although toolbars can provide advantages to the user, IT administrators often do not want toolbars to be installed on the computers in their network; toolbars can introduce various non-monetary costs as well as create risks for enterprise networks.

read more

Follow Us

Get our latest research and news in your inbox monthly