The Great Content Decay Experiment

Step 1: Make Observations With the growing popularity of cloud-based productivity products on mobile devices, users have most likely experienced first-hand the distressing phenomenon that is content decay. Though fairly new and ostensibly optimized for a variety of...

Stop System Hijackers with Intel OS Guard

If an attacker can make your system do whatever he wants, you can be in deep trouble. Escalation-of-privilege attacks use vulnerabilities in your operating system to place the processor in supervisor mode which is meant to be reserved for highly trusted kernel code....