Hosts file hijacks

The hosts file is the internet variant of a personal phonebook. We discuss a few malware variants that replace or change that phonebook, so you end up calling the wrong sites. The ones they want you to call.

Read more

Surfacing HTA infections

We show two examples of HTA induced infections we have seen recently. Nothing fancy, but feel free to consider it a general warning, that malware authors are expanding the number of file extensions they are using, to spread their payload.

Read more

Intentional security holes

Sinkholes and watering holes are two words not automatically associated with computer security, yet they are in use to describe two tactics that are used in this field.

Read more

Explained: typosquatting [updated]

Typosquatting is a term you may have seen when reading about internet scams. In essence it relies on users making typing errors (typos) when entering a site or domain name.

Read more

How your business can avoid potentially unwanted programs

We’ve come up with a PUPs cheat sheet that businesses can use to train IT staff and users. A little PUPs awareness, if you will. Read on to learn more about how you get PUPs,

Read more

Select your language