Blog

A perspective on next generation cybersecurity, vulnerabilities, and the cloud.
Kiosk & USB Security
25 Aug 2014

Detecting and Mitigating USB-based Threats

The flexibility of the USB protocol and the inherent trust given by Windows, Mac, and Linux operating systems to Human Interface Devices (HIDs), such as...
Certification
30 May 2014

OPSWAT Certifications for May

Here are our latest OPSWAT Certifications for the month of May. Please give a warm welcome to our new partners Elex Technologies and Tech...
Certification
4 May 2014

OPSWAT Certification

Here is our latest batch of OPSWAT Certifications. Please give a warm welcome to our new...
Advanced Threat Prevention
14 Apr 2014

Scanning for Malware in Android Applications

Android applications are available through a number of different stores and sites. At some stores, you can even download the app file to your PC and apply it...
Advanced Threat Prevention
7 Apr 2014

Using File Type Conversions to Eliminate Malware

There have been several stories in the news recently (here and here) about the variant of the Zeus/Zbot Trojan that was found to be using images to hide...
Vulnerabilities
17 Feb 2014

Can A Video File Contain A Virus?

Video files are not typically thought of as potentially malicious or infected file types, but it is possible for malware to be embedded in or disguised as a...
We’re very enthusiastic about our latest market share report release, which features a new section on threat detection plus a new, interactive...

Sign up for Blog updates

Get information and insight from the leaders in advanced threat prevention.