YARA rules are a way of identifying malware (or other files) by creating rules that look for certain characteristics. YARA was…
Tag: the more you know
Explained: False positives
What are false positives? False positive, which is sometimes written as f/p, is an expression commonly used in cybersecurity to denote…
Facebook worries: I didn’t post that
It is my assumption that most Facebook users don’t look at their own profile often. With your own profile, I mean…
Explained: digital forensics
What is it? Digital forensics is a modern day field of forensic science, which deals with the recovery and investigation of…
Adware the series, the final: Tools section
So far in this series, we have handed you some methods to recognize and remediate adware. We used this diagram as…
Explained: Bayesian spam filtering
Bayesian spam filtering is based on Bayes rule, a statistical theorem that gives you the probability of an event. In Bayesian…
Explained: Environmental variables
Sometimes when you are looking for instructions to troubleshoot software issues or adapt software to your liking and you are looking…
Hosts file hijacks
In an earlier blog post about DNS hijacks, we briefly touched on the hosts file. The hosts file is like your…
Surfacing HTA infections
Given the recent rise in numbers of spam mails with .hta attachments, we decided to follow up on a few infections…
Intentional security holes
Sinkholes and watering holes are two expressions not automatically associated with computer security, yet they are in use to describe two tactics…