Pieter Arntz
Malware Intelligence Researcher

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.

November 16, 2017 - A trusted root certificate is the cornerstone of authentication and security in software and on the Internet. But even this can be abused by criminals. Learn when you shouldn't trust these trusted sources.

CONTINUE READINGNo Comments

November 14, 2017 - The cloud. What is it? What are the pros and cons, and how can we make it as safe as possible? This post covers the basics.

CONTINUE READINGNo Comments

November 6, 2017 - Continuing education about cryptocurrency, we provide some insight into the technology behind blockchain and explain what makes it secure.

CONTINUE READINGNo Comments

October 31, 2017 - As an alternative to reverse engineering malware that is protectively packed, we look at the option of analyzing malware by API calls to determine what a file might be up to.

CONTINUE READING1 Comment

October 24, 2017 - What happens exactly when you delete a file, and how easy or hard is it to recover deleted files? Learn the differences between delete, erase, and overwrite according to digital forensics.

CONTINUE READING1 Comment

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language