Blog

A perspective on next generation cybersecurity, vulnerabilities, and the cloud.
Kiosk & USB Security
25 Aug 2014

Detecting and Mitigating USB-based Threats

The flexibility of the USB protocol and the inherent trust given by Windows, Mac, and Linux operating systems to Human Interface Devices (HIDs), such as...
Advanced Threat Prevention
14 Apr 2014

Scanning for Malware in Android Applications

Android applications are available through a number of different stores and sites. At some stores, you can even download the app file to your PC and apply it...
Advanced Threat Prevention
7 Apr 2014

Using File Type Conversions to Eliminate Malware

There have been several stories in the news recently (here and here) about the variant of the Zeus/Zbot Trojan that was found to be using images to hide...
Vulnerabilities
17 Feb 2014

Can A Video File Contain A Virus?

Video files are not typically thought of as potentially malicious or infected file types, but it is possible for malware to be embedded in or disguised as a...
OPSWAT just launched the Citrix Endpoint Analysis Portal, officially starting our new technology partnership with Citrix. The portal has free tools for host...

Sign up for Blog updates

Get information and insight from the leaders in advanced threat prevention.