-
Techniques such as extracting operating parameters, comparing application profiles across VMs (to look for signs that one has been successfully attacked), and analyzing application behavior in memory (as opposed to just code stored on disk) are far easier in a virtual environment and provide a huge advantage for stopping the most sophisticated threats.
FORBES: Best of Times, Worst of Times: Is Virtualization in the Data Center a Problem or an Opportunity?
-
Bredolab began operating in 2009 and Mr Avanesov used a variety of techniques, including automated attacks and phishing messages, to expand it.
BBC: Russian spam mastermind jailed for creating botnet
-
For all the talk of wanting improved battery life, the limits of technology (and mangling background tasks in the Operating System) mean it is unlikely that current battery technology or programming techniques will lead to any significant increase in battery life in the current physical space given over to the battery.
FORBES: You Can Have It Thin Or You Can Have Battery Life In Your iPad Mini...Not Both
-
The most established technology related to tracking social media comes from Autonomy's Intelligent Data Operating Layer (IDOL) platform, which has been scanning the Internet using techniques based on patterns and probability for more than a decade.
FORBES: JargonSpy