What are false positives? False positive, which is sometimes written as f/p, is an expression commonly used in cybersecurity to denote…
Tag: the more you know
Facebook worries: I didn’t post that
It is my assumption that most Facebook users don’t look at their own profile often. With your own profile, I mean…
Explained: digital forensics
What is it? Digital forensics is a modern day field of forensic science, which deals with the recovery and investigation of…
Adware the series, the final: Tools section
So far in this series, we have handed you some methods to recognize and remediate adware. We used this diagram as…
Explained: Environmental variables
Sometimes when you are looking for instructions to troubleshoot software issues or adapt software to your liking and you are looking…
Hosts file hijacks
In an earlier blog post about DNS hijacks, we briefly touched on the hosts file. The hosts file is like your…
Intentional security holes
Sinkholes and watering holes are two expressions not automatically associated with computer security, yet they are in use to describe two tactics…
Explained: typosquatting [updated]
Typosquatting is a term you may have seen when reading about Internet scams. In essence it relies on users making typing…
How your business can avoid potentially unwanted programs
Fending off malware is more than a full-time job. Those who work in cybersecurity have their hands full patching vulnerabilities, cleaning…
BleepingComputer Defends Freedom of Speech
Hey folks, Very recently, a very popular and useful website called Bleeping Computer reached out to the community at large asking…