We research. You level up.
Criminals / Threat analysis
Tech support scammers have done cold calls, scary pop ups and now are writing their own malware.
Cybercrime / Malware
Since the introduction of Task Scheduler 2.0, the Scheduled Tasks use xml files and the .job extension. What hasn’t changed, is the extensive use of Tasks by Adware and other Potentially Unwanted Programs.
101 / FYI
Months after Microsoft pulls the plug on Windows XP, we revisit the numbers then and now.
101 / How-tos
In Windows, what is safe mode how does it work?
Cyber-crooks continue to use Microsoft Azure’s web hosting service to house phishing websites, like this one targeting Apple users.
Select your language