The security technology called "sandboxing" aims at detecting malware code by subjecting it to run in a computer-based system of one type of another to analyze it for behavior and traits indicative of malware. Sandboxing -- one alternative to traditional signature-based malware defense -- is seen as a way to spot zero-day malware and stealthy attacks in particular. While this technique often effective, it's hardly foolproof, warns a security researcher who helped establish the sandboxing technology used by startup Lastline.
- The NSA reportedly tried -- but failed -- to use a Stuxnet variant against North Korea
- Google levels up security at I/O with secure comms tool, better authentication
- New NSA phone dragnet proposals blasted as flawed
- Tor connections to hidden services could be easy to de-anonymize
- How Google took a page from Apple to secure Android Pay