Understanding the basics of Two-Factor Authentication

With data breaches resulting in leaked passwords occurring almost daily, two-factor authentication has become an essential tool in the security toolkit.Categories: 101
FYITags: 2faauthenticationmfaMulti-Factor AuthorizationpasswordsPieter Arntzssotoke… Continue reading Understanding the basics of Two-Factor Authentication

Explained: Domain Generating Algorithm

Domain Generating Algorithms are in use by cyber criminals to prevent their servers from being blacklisted or taken down. The algorithm produces random looking domain names. The idea is that two machines using the same algorithm will contact the same d… Continue reading Explained: Domain Generating Algorithm

Forced into installing a Chrome extension

We have found several sites created for the sole purpose of attempting to force users to install a Chrome extension. These sites are usually redirects from domains that offer cracks, keygens, and adult entertainment.Categories: Cybercrime
Social engin… Continue reading Forced into installing a Chrome extension

Configuring the Windows firewall

While the built-in Windows firewall may offer adequate protection, this is only true if you check the settings on a regular basis, and certainly immediately after removing an infection.Categories: 101
How-tosTags: allowed programsfrstmalwarenetshPiete… Continue reading Configuring the Windows firewall

Fake pharma sites are getting even more obnoxious

Recently, we have noticed that pharma sites seem to have discovered the use of JavaScript to change the “Stay or Leave” messages that you see, when you try to close or leave their sites.

Categories:

Tags:

(Read more…)

Continue reading Fake pharma sites are getting even more obnoxious

PUP Friday: Content Protector

Content Protector is an adware that is offered as a netfiltering program. This seems a bit strange for ad-supported software. It also comes with it’s own certificate.Categories: PUPs
Threat analysisTags: adwarecontent defenderContent protectornetfilte… Continue reading PUP Friday: Content Protector

Youndoo creates new Chrome profile

A new Youndoo hijacker from the Elex family copies most of the settings from an existing Chrome user account to create a fake, infected one.Categories: Cybercrime
MalwareTags: browser hijackerchromeelexfake Chrome profilePieter ArntzPUPPUPsYoundoo(Rea… Continue reading Youndoo creates new Chrome profile