October 31, 2017 - As an alternative to reverse engineering malware that is protectively packed, we look at the option of analyzing malware by API calls to determine what a file might be up to.
October 24, 2017 - What happens exactly when you delete a file, and how easy or hard is it to recover deleted files? Learn the differences between delete, erase, and overwrite according to digital forensics.
October 18, 2017 - Since September 19, the number two most frequently blocked website for our customers has been coinhive.com. This post will describe what CoinHive is, what it is doing, and why we are blocking it.
September 15, 2017 - YARA is a tool that can be used to identify files that meet certain conditions. It is mainly in use by security researchers to classify malware.
September 13, 2017 - As more life-saving medical devices are capable of connecting to the internet, the potential threat of malicious hacking leading to physical bodily harm becomes more real. An independent researcher recently found multiple vulnerabilities plaguing a particular syringe pump. ICS-CERT offers several defensive measures.