Articles on Malware
- Web Security Free Online Tools for Looking up Potentially Malicious Websites A curated list of free online tools for investigating potentially malicious websites, ranging from services that provide historical reputation data to those that examine URLs in real time. Options...
- Malware Internet Noise and Malicious Requests to a New Web Server A new web server with no public content immediately receives scans for open proxies, probes from potentially infected systems, and searches for phpMyAdmin vulnerabilities. These requests represent...
- Social Engineering Attackers Rely on Social Engineering to Activate Macros in Malicious Documents Malicious document authors persuade victims to enable macros by claiming the security warning indicates protected content or by providing detailed step-by-step instructions for changing macro...
- Incident Response Speaking at the Forensic Lunch
- Malware Malware: Whom or What Are We Fighting? The people behind malware shape the threat as much as the malware itself. Effective defense requires understanding the threat actors, their motivations, and how they operate.
- Malware Researching Scams Helps Understand Human Vulnerabilities Online scammers exploit predictable human vulnerabilities: starting scams in the physical world, customizing messages with victims' locations, appealing to vanity and self-interest, posing as...