What threats are you missing?

Are traditional security methods enough?

Stay up to date with the SecureValue Blog

Most Recent Articles

100 Days of YARA: Writing Signatures for .NET Malware

If YARA signatures for .NET assemblies only rely on strings, they are very limited. We explore more detection opportunities, including IL code, method signature definitions and specific custom attributes. Knowledge about the underlying .NET metadata st…

The Hidden Dangers of Free Apps and Games for Kids

Nothing in life is truly free—and that includes the apps and games your child loves. While they may not require an upfront payment, many of these “free” apps come with hidden costs. Some collect personal data, others bombard kids with ads, and many enc…

Watch Out for These Health Scams on World Health Day

Happy World Health Day! While we’re all focusing on fitness, nutrition, and wellness, scammers are doing their own kind of stretches—stretching the truth, that is.

Scammers love wellness trends because they make for great bait. From bogus supplements …

How to Talk About Password Security With Kids

Talking to kids about password security might feel tricky, especially if you’re not exactly a tech whiz yourself. But it’s important—and actually easier than you might think.

Here are some simple tips to help you discuss passwords in a way kids can ea…