Articles on Tools
- Malware How Would You Detect and Impede Ransomware on an Endpoint? Anti-ransomware tools can detect malicious encryption by flagging processes that read or write too many files too quickly, or by monitoring for changes to files' entropy values. Decoy files that...
- Assessments Experts Cannot Help Overstating Their Expertise Self-proclaimed experts are more likely to claim knowledge of things they don't know, including nonexistent terms in their fields of expertise. This overclaiming tendency means security professionals...
- Networking A Close Look at PayPal Overpayment Scams That Target Craigslist Sellers PayPal overpayment scams target Craigslist sellers using fake payment notifications that ask victims to wire funds to a third-party "pickup agent." Scammers craft stories about working in rural areas...
- Tools Generating Domain Name Variations Used in Phishing Attacks Phishing attackers register domain names similar to targeted organizations using techniques like bitsquatting, homoglyphs, letter repetition, transposition, and typos. Tools like dnstwist and...
- Malware Conversation With a Tech Support Scammer Tech support scammers use scareware web pages to convince visitors their PCs are infected, then employ consultative sales tactics when victims call for help. Representatives use legitimate remote...
- Malware Analysis Contemplating Malware Vaccination via Infection Markers Some malware checks for infection markers like mutexes, registry keys, or processes to avoid infecting systems twice. Preemptively creating these markers can vaccinate systems against specific...