DIY Tuning Capacitors from Washers and 3D-Printed Parts

The inside of classic radios holds wonders that the sterile chips and SMD components of today’s circuits can’t hold a candle to. Chunky resistors and capacitors, vacuum tubes with cathodes aglow, and seemingly free-form loops of wire forming inductors will all likely make an appearance. But the most fascinating bit of any old radio was connected to the tuning knob: the big variable capacitor with its interdigitating metal plates. Watching one at work, with its plates evenly and finely spaced, is still a joy to behold.

In an attempt to recapture a little of that magic, [Jeremy S. Cook] came …read more

Continue reading DIY Tuning Capacitors from Washers and 3D-Printed Parts

Remove RedEye Ransomware Virus – Restore .RedEye Files

This article will aid you to remove RedEye Ransomware virus completely. Follow the ransomware removal instructions given near the end of the article. RedEye Ransomware is a virus that encrypts your files and demands money as a ransom to get…Read more… Continue reading Remove RedEye Ransomware Virus – Restore .RedEye Files

RedEye ransomware: there’s more than meets the eye

A rather anonymous account reached out to me on Twitter asking to check out a “scary & really nasty” sample.
It turned out to be RedEye ransomware, a new strain or variant by the same creator of Annabelle ransomware, which I discovered in February … Continue reading RedEye ransomware: there’s more than meets the eye

IT threat evolution Q1 2018

In January, we uncovered a sophisticated mobile implant Skygofree that provides attackers with remote control of infected Android devices. Network worm OlympicDestroyer attacked on the Olympic infrastructure just before the opening of the games in February. Continue reading IT threat evolution Q1 2018

Secrets of the Wiper: Inside the World’s Most Destructive Malware

The actors behind this kind of code, whether they’re bent on sending a political message or simply wanting to cover their tracks after data exfiltration, have adopted various techniques to carry out those activities. Continue reading Secrets of the Wiper: Inside the World’s Most Destructive Malware

The devil’s in the Rich header

In our previous blog , we detailed our findings about the attack against the Pyeongchang 2018 WinterOlympics. For this investigation, our analysts were provided with administrative access to one of the affected servers located in a hotel based in Pyeongchang county, South Korea. In addition, we collected all available evidence from various private and public sources and worked with several companies on investigating the C&C infrastructure associated with the attackers. Continue reading The devil’s in the Rich header