cybersecurity

Is It GAME OVER?

Targeted attacks take many forms, though there is one common tactic most of them share: Exploitation. To achieve their goal, they need to penetrate different systems on-the-go. The way this is done is by exploiting unpatched or unknown vulnerabilities. More common forms of exploitation happen via a malicious document that exploits vulnerabilities in Adobe Reader or a malicious URL that exploits the browser in order to set a foothold inside the end-point computer. Zero-Day is…

Continue reading

cybersecurity

Exploit in the Wild, Caught Red-Handed

Imagine a futuristic security technology that can stop any exploit at the exact moment of exploitation?regardless of the way the exploit was built, its evasion techniques, or any mutation it might have or was possibly imagined to have. This technology is truly agnostic for any form of attack. An attack prevented with its attacker captured and caught red-handed at the exact point in time of the exploit…Sounds dreamy, no? For the guys at the stealth…

Continue reading

cybersecurity

The Emergence of Polymorphic Cyber Defense

Background Attackers are Stronger Now The cyber-world is witnessing a fast-paced digital arms race between attackers and security defense systems, and 2014 showed everyone that attackers have the upper hand in this match.? Attackers are on the rise due to their growing financial interest?motivating a new level of sophisticated attacks that existing defenses are unmatched to combat. The fact that almost everything today is connected to the net and the ever-growing complexity of software and…

Continue reading

startups

Easily develop cool UI in native client applications

For a long time, I was contemplating on the best strategy for client application development, mobile clients, or desktop client applications. The problem with native client application development is usually the difficulty of building the UI and applying changes to it over time. Since I did both web development and client development I am accustomed in the web area for the ease of UI creation as well as applying changes to it. In web development…

Continue reading

startups

The Web Crawls Silently into the Desktop

Recently I got deeply interested in rich Internet technologies such as Adobe Air and Microsoft Silverlight and it is hard to not see the trend of returning to good old desktop applications with one big twist – the web included. These rich desktop applications are naturally integrated into the web with its rich services, content while enjoying UI breakthroughs achieved by browsers and site designers. It is great to see unique and smooth UI concepts…

Continue reading