- Social Engineering Social Engineering Western Union Scam - The Role of a Money Mule
Western Union scams entice victims to send money—at the end of the trail is a money mule. Criminals recruit individuals, often unknowingly, to receive and forward stolen funds, making the money trail...
- Training Expansion of the SANS Reverse-Engineering Malware (REM) Course FOR610 in 2010
- Cheat Sheets Security Architecture Cheat Sheet for Internet Applications
A cheat sheet for initial design and review of Internet application security architecture, covering four areas: business requirements (data classification, users, partners, regulations),...
- Malware Analysis 5 Steps to Building a Malware Analysis Toolkit Using Free Tools
Five steps to build a malware analysis toolkit: allocate virtual systems (VirtualBox, VMware), isolate from production networks, install behavioral tools (Process Monitor, Wireshark, Regshot),...
- Fun Translated Poems
- Malware Malware Updates from Companies and Individuals on Twitter