- Tools Generating Domain Name Variations Used in Phishing Attacks
Phishing attackers register domain names similar to targeted organizations using techniques like bitsquatting, homoglyphs, letter repetition, transposition, and typos. Tools like dnstwist and...
- Malware Conversation With a Tech Support Scammer
Tech support scammers use scareware web pages to convince visitors their PCs are infected, then employ consultative sales tactics when victims call for help. Representatives use legitimate remote...
- Malware Analysis Contemplating Malware Vaccination via Infection Markers
Some malware checks for infection markers like mutexes, registry keys, or processes to avoid infecting systems twice. Preemptively creating these markers can vaccinate systems against specific...
- Tools Experimenting with Honeypots Using the Modern Honey Network
The Modern Honey Network (MHN) simplifies deploying and managing low-interaction honeypots like Cowrie, Dionaea, and Wordpot through a web-based interface. Installing MHN on an inexpensive cloud VM...
- Communication How to Become a Better Technical Writer
Strong writing skills are essential for IT professionals because people will judge the quality of technical work based on how well it's communicated. Improving requires deliberate practice through...
- Cloud Getting to Know Docker for Distributing and Running Applications
Docker packages applications into containers that include all necessary dependencies and configuration, eliminating installation headaches for end users. Containers share the host OS kernel rather...