Explained: Environmental variables

This post is intended to make readers aware of the existence and use of environmental variables. A windows feature that is often only known to programmers and other advanced users.

Read more

Hosts file hijacks

The hosts file is the internet variant of a personal phonebook. We discuss a few malware variants that replace or change that phonebook, so you end up calling the wrong sites. The ones they want you to call.

Read more

Surfacing HTA infections

We show two examples of HTA induced infections we have seen recently. Nothing fancy, but feel free to consider it a general warning, that malware authors are expanding the number of file extensions they are using, to spread their payload.

Read more

Intentional security holes

Sinkholes and watering holes are two words not automatically associated with computer security, yet they are in use to describe two tactics that are used in this field.

Read more

Explained: typosquatting [updated]

Typosquatting is a term you may have seen when reading about internet scams. In essence it relies on users making typing errors (typos) when entering a site or domain name.

Read more

Select your language