Is domain name abuse something companies should worry about?

Should you worry about domain name abuse? For the most part it depends on what kind of company you are and what you expect to encounter.

Read more

Lock and Code S1Ep11: Locating concerns of Bluetooth and beacon technology with Chris Boyd

We talk to Chris Boyd about Bluetooth technology, how the tech is used in online advertising today, and more, on the latest episode of Lock and Code.

Read more

Website misconfigurations and other errors to avoid

Website misconfigurations can lead to hacking, malfunction, and worse. We take a look at recent mishaps and advise site owners on how to lock down their platforms.

Read more

As Internet turns 50, more risks and possibilities emerge

The world as we know it changed on October 29, 1969, the day the Internet was born. 50 years later, it’s both ubiquitous and full of potential—and risks.

Read more

Meet Extenbro, a new DNS-changer Trojan protecting adware

We found a new Trojan that uses aggressive techniques, including blocking access to security sites, to deliver an adware bundler. Read up on what Extenbro can do and how to get this pest off your system.

Read more

Adware the series, part 2

In part 2 of our adware series, we focus on a few methods to reroute, intercept, and change your internet traffic.

Read more

The Day the Internet Died

Today there was a massive DDoS attack that targeted one of the DNS providers that acts as a backbone for the internet, especially in the western part of the world.

Read more

Hosts file hijacks

The hosts file is the internet variant of a personal phonebook. We discuss a few malware variants that replace or change that phonebook, so you end up calling the wrong sites. The ones they want you to call.

Read more

TopFlix: a DNS Unlocker variant

We take a look at a DNS hijacker called TopFlix. It poses as a media-player and is brought to you by one of the main stream bundle wrappers called SoftPulse.

Read more

Trojan.DNSChanger circumvents Powershell restrictions

We take a close look at the functionality of a new variant of the DNS-changer adware family. Especially the use of encoded scripts as a way to bypass the Powershell execution protection.

Read more

Select your language