malware analysis

4 Methods of Malware Analysis

As described by Mr. Lenny Zeltser, malware analysis can occur in 4 distinct phases. These steps and methods are listed in order from easiest to hardest. They are: Fully Automated Analysis Static Properties Analysis Interactive Behavior Analysis Manual Code Reversing Fully automated analysis involve the use of tools that scan files and produce reports on…

Data Breaches

Data Breaches What is a data breach? Generally, a data breach is a security incident where digital information is accessed or taken in an unauthorized manner. Enterprise risk management explains that there are five types of data breaches: Malware Phishing Password Attacks Ransomware and Denial-of-Service Malware is software whose purpose is to harm a device…

Self-Driving Trucks Coming Soon?

Self-Driving Trucks Coming Soon? Do we need humans to drive or could a computer do better? Look no farther than self-driving trucks. We will probably find out in the next few years, because multiple companies are now testing self-driving trucks. Although many of the technical problems are still unresolved, proponents claim that self-driving trucks will…

Loyphish-Malicious Software

Loyphish – Malicious Software PWS:HTML/Loyphish.G, more commonly referred to as Loyphish, is a type of attack that involves visiting a phishing page, which is a malicious webpage used to steal your login credentials. It belongs to be a member of the PWS:HTML/Phish family. In most cases it disguises itself as a legitimate banking webpage and attempts…

Nikon D850

The Nikon D850 is Nikon’s latest high resolution full-frame DSLR, boasting a 46MP backside-illuminated CMOS sensor. But, in a fairly radical departure for the series, it is also one of the company’s fastest-shooting DSLRs. This combination of properties should significantly widen the camera’s appeal to high-end enthusiasts as well as a broad range of professional…