Explained: Environmental variables

This post is intended to make readers aware of the existence and use of environmental variables. A windows feature that is often only known to programmers and other advanced users.

Read more

A closer look at a tech support screen locker

As a demonstration of how Tech Support Scammers operate and try to lure victims into calling their number, we show you some snippets of the code, explaining what they’re up to.

Read more

Explained: Domain Generating Algorithm

Domain Generating Algorithms are in use by cyber criminals to prevent their servers from being blacklisted or taken down. The algorithm produces random looking domain names. The idea is that two machines using the same algorithm will contact the same domain at a given time.

Read more

Forced into installing a Chrome extension

We have found several sites created for the sole purpose of attempting to force users to install a Chrome extension. These sites are usually redirects from domains that offer cracks, keygens, and adult entertainment.

Read more

Configuring the Windows firewall

While the built-in Windows firewall may offer adequate protection, this is only true if you check the settings on a regular basis, and certainly immediately after removing an infection.

Read more

Select your language