- Assessments Experts Cannot Help Overstating Their Expertise
Self-proclaimed experts are more likely to claim knowledge of things they don't know, including nonexistent terms in their fields of expertise. This overclaiming tendency means security professionals...
- Networking A Close Look at PayPal Overpayment Scams That Target Craigslist Sellers
PayPal overpayment scams target Craigslist sellers using fake payment notifications that ask victims to wire funds to a third-party "pickup agent." Scammers craft stories about working in rural areas...
- Tools Generating Domain Name Variations Used in Phishing Attacks
Phishing attackers register domain names similar to targeted organizations using techniques like bitsquatting, homoglyphs, letter repetition, transposition, and typos. Tools like dnstwist and...
- Malware Conversation With a Tech Support Scammer
Tech support scammers use scareware web pages to convince visitors their PCs are infected, then employ consultative sales tactics when victims call for help. Representatives use legitimate remote...
- Malware Analysis Contemplating Malware Vaccination via Infection Markers
Some malware checks for infection markers like mutexes, registry keys, or processes to avoid infecting systems twice. Preemptively creating these markers can vaccinate systems against specific...
- Tools Experimenting with Honeypots Using the Modern Honey Network
The Modern Honey Network (MHN) simplifies deploying and managing low-interaction honeypots like Cowrie, Dionaea, and Wordpot through a web-based interface. Installing MHN on an inexpensive cloud VM...