Viruses, trojans and other malware

Last Updated on 11 Jan. 2017, Total: 39 Articles and Tutorials

  1. Ransomware-let’s fight back!

    Although ransomware has been established for a very long time: recently people have been made more conscious of ransomware and are more knowledgeable of what it is, including its regular occurrences. Albeit not new, the impact of ransomware has likely become more far reaching and more serious with time. Businesses are more reliant on digital data and IT systems and... Read More

  2. The return of macro attacks

    Macro attacks are on the rise. Microsoft suggests that 98% of Office-targeted threats are utilising macros presently. Let’s revisit macros, this old-fashioned form of attack - consider ways to deter the threat and look at the new Microsoft Office 2016 feature released to help defend organisations against the resurge in macro attacks... Read More

  3. Learning from 2014 Threats to Better Equip Enterprise for the Security Challenges of 2015

    In this article we will consider some of the threats faced in 2014 and steps that could be taken to ensure better preparedness for the possible security threats of 2015... Read More

  4. Pass-The-Hash: Protect Your Windows Computers! (Part 3)

    In this article we'll discuss how to remove LANManager... Read More

  5. Advanced Persistent Threat Perception and Reaction (Part 1)

    In part one of the series we concentrate on identifying APTs as well as the first steps to safeguarding against APTs attacks with insight into asset clarification and security posture assessment... Read More

  6. Pass-The-Hash: Protect Your Windows Computers! (Part 2)

    In this article we'll cover some of the GPO settings you can use to protect your computers from PTH attacks... Read More

  7. Pass-The-Hash: Protect Your Windows Computers! (Part 1)

    This article takes a look at the hottest exploit on Windows, Pass-The-Hash (PTH)... Read More

  8. Mobile security updates 2012

    This article will focus on how you can improve the security of your mobile devices against new and old threats... Read More

  9. Hunt Down and Kill Malware with Sysinternals Tools (Part 3)

    This third and last installment in the series will cover how to use Process Monitor for detecting changes to the registry and file system that may be made by malware... Read More

  10. Hunt Down and Kill Malware with Sysinternals Tools (Part 2) - Autoruns

    In this Part 2, I will talk about how you can use Autoruns tool to find malware that boots at startup... Read More