- Social Networking Profile Spy Scams on Facebook
Facebook scams promising "Find out who viewed your profile" trick victims into revealing personal details including phone numbers. The malicious site shows fake Facebook pages in the background to...
- Cloud OpenDNS, NortonDNS and ClearCloud Filter Malicious Domains
DNS-based security services like OpenDNS, NortonDNS, and ClearCloud filter malicious domains—easy to set up (no client software needed), easy to use (users do nothing), affordable (free), and...
- Social Engineering Social Engineering Western Union Scam - The Role of a Money Mule
Western Union scams entice victims to send money—at the end of the trail is a money mule. Criminals recruit individuals, often unknowingly, to receive and forward stolen funds, making the money trail...
- Training Expansion of the SANS Reverse-Engineering Malware (REM) Course FOR610 in 2010
- Cheat Sheets Security Architecture Cheat Sheet for Internet Applications
A cheat sheet for initial design and review of Internet application security architecture, covering four areas: business requirements (data classification, users, partners, regulations),...
- Malware Analysis 5 Steps to Building a Malware Analysis Toolkit Using Free Tools
Five steps to build a malware analysis toolkit: allocate virtual systems (VirtualBox, VMware), isolate from production networks, install behavioral tools (Process Monitor, Wireshark, Regshot),...