RegretLocker, new ransomware, can encrypt Windows virtual hard disks

Cybersecurity researchers discovered a new ransomware called RegretLocker that can quickly encrypt virtual had disks on Windows machines.

Read more

Technology and the power of moral panic

We look at how technology and a splash of moral panic have made for strange companions down the years.

Read more

Malware vaccination tricks: blue pills or red pills

Malware vaccination tricks are offered for various sorts and families of malware, but can and should we use them? What are the pros and cons? Read all about it.

Read more

A Look at Malware with Virtual Machine Detection

What you can do against malware with Virtual Machine detection.

Read more

Online PC Support Scams: Turning the Tables

You may recall a post I wrote back in April about fake Microsoft phone support calls. I had received a call from scammers whose job was to trick me into buying a bogus program for ‘only’ $299. When they saw I was not willing to pay, they got mad and deleted documents and pictures off…

Read more

Phone scammers call the wrong guy, get mad and trash PC

[ Need assistance? Please consult our Help & Resource Page ]  Have you ever received a call from someone with a heavy Indian accent from Microsoft saying your computer had errors or viruses? The purpose of these calls is to get an easy $299 (or whatever amount they choose) by scaring you into thinking there’s…

Read more

Anonymizing Traffic for your VM And Capturing Traffic

Security Level: High / Hardcore Purpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks AND being able to perform dynamic malware analysis and capture malicious traffic moving between the malware and the C&C. (Whew, that’s a lot of ANDs. =D) Benefits: Hide your…

Read more

Anonymizing Traffic For Your VM

Security Level: Medium Purpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks. Benefits: Hide your IP Protect the host system by running in a virtual environment Execute malware in a safe environment (non-traffic capture) Drawbacks: Not as easy to setup Need to gather…

Read more

Select your language