Malware

Given Google Chrome’s popularity, it is no surprise to see it being more and more targeted these days. In particular, less than reputable ad networks are contributing to the distribution of malicious Chrome extensions via very deceptive means. In this post we look at a forced installation of such an extension…

Read More

Bayesian spam filtering is based on Bayes rule, a statistical theorem that gives you the probability of an event. In Bayesian filtering it is used to give you the probability that a certain email is spam. The name Named after the statistician Rev. Thomas Bayes who provided an equation that…

Read More

Last week, we gave a shout out to Safer Internet Day, passed around some tips for safe(r) public Wi-Fi use, and took a deep dive into Spigot browser hijackers. We had double the trouble in Mac land, with the defense industry coming under fire from rogue downloaders, and Microsoft office…

Read More

This spam email contained not only the intended victim’s name, but also their home address and an apparently valid mobile telephone number: Sent: 14 February 2017 13:52 To: [redacted] From: <customer@localpoolrepair.com> Subject: Mr [Redacted] Your order G29804772-064 confirmation Dear Mr [redacted], Thank you for placing an order with us. For…

Read More

The volume of ransomware encounters is on a downward trend. Are we seeing the beginning of the end of this vicious threat? Unfortunately, a look at the attack vectors, the number of unique families released into the wild, and the improvements in malware code reveals otherwise. Ransomware was arguably the…

Read More

The volume of ransomware encounters is on a downward trend. Are we seeing the beginning of the end of this vicious threat? Unfortunately, a look at the attack vectors, the number of unique families released into the wild, and the improvements in malware code reveals otherwise. Ransomware was arguably the…

Read More

With Valentine’s Day rapidly approaching, love is in the air and so are Valentine’s Day security tips blogs, of which this is one. While you dash out for a last-minute purchase of flowers and a “Happy 5th Birthday” card played as a gag because they were all out of romantic ones at the…

Read More

Many system administrators rely on Microsoft’s Security Bulletins to obtain information about critical security issues. However, from February’s Patch Tuesday onwards, Microsoft will no longer be publishing them. Instead, the company has chosen to replace the bulletins with an online database, causing uncertainty among system administrators. Source: Security Blog G…

Read More

Last November, I gave a talk in Ireland at the fantastic IRISSCON, a huge annual security conference which covers everything from social engineering and use of language to the criminal underground and heart hacking. My talk was all about EULAs, or at least, it used EULAs as a starting point before…

Read More