“Over the years, phishing attacks have changed, as with most things, and have been segmented into different groups of variants.” –Me…
Tag: adam kujawa
Phishing 101: Part 1
This week, there is a lot of media hype over emails being sent to users of the Royal Bank of Scotland…
BlackShades in Syria
As reported by the Electronic Frontier Foundation (EFF) earlier this week, a new Trojan is being spread to Syrian activists in…
You Dirty RAT! Part 2 – BlackShades NET
Last week we talked about the Remote Administration Trojan DarkComet and all the wonderful and scary things it can do. In…
You dirty RAT! Part 1: DarkComet
Last week, I talked a little about the Flame Trojan and how much the average user would need to worry about…
RATs of Unusual Sizes
The flame malware has been referred to by some as “The most sophisticated malware to date” and while it is quite…
You can’t buy happiness but you can advertise it!!
Since December of 2011, the spread of malicious advertisements, or “Malvertisements”, has drastically increased. Along with this trend is the increased…
DDOS, Botnets and Worms…Oh My!
The recent attack on the Serious Organized Crime Agency (SOCA), most likely in response to the 36 data selling sites shut…
Anonymizing Traffic for your VM And Capturing Traffic
Security Level: High / Hardcore Purpose: To hide who you are while performing research through your browser AND protecting your host…
Anonymizing Traffic For Your VM
Security Level: Medium Purpose: To hide who you are while performing research through your browser AND protecting your host system from…