How to secure your remote workers

Remote workers are often the weakest link in a company’s cybersecurity defenses. Find out how your company can protect its network and remote employees from threats.

Read more

Who’s Behind Your Proxy? Uncovering Bunitu’s Secrets

Is your VPN really safe? Bunitu infected PCs serve as free exit nodes.

Read more

Fake VPN Site Serves Up Keylogger

A site claiming to offer VPN services could potentially result in keyloggers being placed on the PC.

Read more

Anonymizing Traffic for your VM And Capturing Traffic

Security Level: High / Hardcore Purpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks AND being able to perform dynamic malware analysis and capture malicious traffic moving between the malware and the C&C. (Whew, that’s a lot of ANDs. =D) Benefits: Hide your…

Read more

Anonymizing Traffic For Your VM

Security Level: Medium Purpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks. Benefits: Hide your IP Protect the host system by running in a virtual environment Execute malware in a safe environment (non-traffic capture) Drawbacks: Not as easy to setup Need to gather…

Read more

Select your language