My Writing
- Malware The Dark Side of Remote Desktop The Morto worm spread by scanning for RDP on port 3389 and brute-forcing Administrator passwords using common credentials. Tools like TSGrinder and Ncrack automate RDP password attacks. Mitigations...
- Malware Analysis Process Monitor Filters for Malware Analysis and Forensics Process Monitor captures enormous amounts of data that can overwhelm analysts. Custom filters help by hiding boring entries or highlighting interesting events. Downloadable filter sets look for...
- Incident Response How to Get into Digital Forensics or Security Incident Response Employers rarely invest in growing beginner forensics analysts, so individuals must build relevant skills within current roles. System admins can learn incident investigation tools, network admins...
- Leadership Saying Something Nice About Information Security
- Training Psychological Similarities Between Shoplifting and Malicious Hacking Studies suggest 60% of consumers have shoplifted at some point—most are amateurs who steal sporadically. Shoplifters report excitement from adrenaline, superiority over store clerks, and belonging to...
- Malware Can We Rely on the Antivirus' Ability to Disinfect a System? When antivirus detects malware that already executed, clicking "Remove" and moving on is tempting but risky. Other undetected malware may remain, or attackers may have already expanded their...