Royal Mail phish deploys evasion tricks to avoid analysis
We look at a Royal Mail phish which deploys multiple techniques to keep people from analysing a fake Royal Mail website.
Clop targets execs, ransomware tactics get another new twist
Clop’s targeting of executives’ workstations is the latest in a string of recent innovations in ransomware.
RegretLocker, new ransomware, can encrypt Windows virtual hard disks
Cybersecurity researchers discovered a new ransomware called RegretLocker that can quickly encrypt virtual had disks on Windows machines.
Technology and the power of moral panic
We look at how technology and a splash of moral panic have made for strange companions down the years.
Malware vaccination tricks: blue pills or red pills
Malware vaccination tricks are offered for various sorts and families of malware, but can and should we use them? What are the pros and cons? Read all about it.
A Look at Malware with Virtual Machine Detection
What you can do against malware with Virtual Machine detection.
Online PC Support Scams: Turning the Tables
You may recall a post I wrote back in April about fake Microsoft phone support calls. I had received a call from scammers whose job was to trick me into buying a bogus program for ‘only’ $299. When they saw I was not willing to pay, they got mad and deleted documents and pictures off…
Phone scammers call the wrong guy, get mad and trash PC
[ Need assistance? Please consult our Help & Resource Page ] Have you ever received a call from someone with a heavy Indian accent from Microsoft saying your computer had errors or viruses? The purpose of these calls is to get an easy $299 (or whatever amount they choose) by scaring you into thinking there’s…
Anonymizing Traffic for your VM And Capturing Traffic
Security Level: High / Hardcore Purpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks AND being able to perform dynamic malware analysis and capture malicious traffic moving between the malware and the C&C. (Whew, that’s a lot of ANDs. =D) Benefits: Hide your…
Anonymizing Traffic For Your VM
Security Level: Medium Purpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks. Benefits: Hide your IP Protect the host system by running in a virtual environment Execute malware in a safe environment (non-traffic capture) Drawbacks: Not as easy to setup Need to gather…