We research. You level up.
Security world / Technology
This post explains the pros and cons of using user agents when browsing the world wide web. What does it reveal and why?
Do you want to know how security certificates work and let us show you how malware can abuse the certificates system to block you from downloading and/or running your favorite software.
101 / How-tos
In this last part of the short series about the basics of PowerShell we assemble a small script from scratch and explain how it works.
We are going to construct some basic PowerShell commands and explain how they work just to show you how useful PowerShell can be. For good and for bad.
Cybercrime / Malware
Following some arrests in China, we hope to see a decrease in the amount of adware and adfraud hailing from the Rafotech labs aka Fireball.
Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.
Select your language