A multi-purpose fake online scanner

Just to show you that behind some PUPs there are threat actors that are too lazy to be bothered, we offer you a fake online scanner that was used to promote the infamous MacKeeper and a Windows system optimizer called Advance-System-Care.

Read more

DNSSEC: why do we need it?

We take a look at what DNSSEC is and why we need it. Plus an overview of how far the implementation has progressed in the Netherlands based on a SIDN report.

Read more

Explained: Bayesian spam filtering

Bayesian spam filtering is based on Bayes rule, a statistical theorem that gives you the probability of an event. In Bayesian filtering it is used to give you the probability that a certain email is spam. The name Named after the statistician Rev. Thomas Bayes who provided an equation that basically allows new information to…

Read more

Spigot browser hijackers

Spigot browser hijackers of this family are easy to recognize and in our opinion hardly worth installing because they add no more functionality then a few bookmarks. We hope this post helps you to avoid them in the future.

Read more

Understanding the basics of two-factor authentication

With data breaches resulting in leaked passwords occurring almost daily, two-factor authentication has become an essential tool in the security toolkit.

Read more

Select your language