Fighting Fraud: The SCAM Framework

Fighting Fraud: The SCAM Framework

Fighting Fraud: The SCAM Framework This is the first in a series of articles talking about common scams and fraud tactics, and how to avoid being fooled. Every day, scammers from across the globe target people to try and get them to pay up. In future articles, we’ll...

Controlled Folder Access for the Win!

Controlled Folder Access for the Win! Our founder and CEO, Brian Markus, recently wrote up an encounter he had with Windows Defender. It turns out that controlled folder access works great, and with a little research, you can see exactly what it’s doing and why....
Presenting: Capture The Packet Micro!

Presenting: Capture The Packet Micro!

Presenting: Capture The Packet Micro! We’ve been working hard on our latest prototype, and we’re proud to formally present Capture The Packet Micro! All the CTP features you rely on in a new, micro-size package. Check out our latest offering below! Smaller...
BITB Attack Demo

BITB Attack Demo

Browser-In-The-Browser Exploit Demo Warning! The following page contains important knowledge! Have you heard of the browser-in-the-browser attack? Learn how to stay safe and spot fakes! There’s a new technique on the internet designed to fool you into giving up...
What Do Cyber Protection Teams Do?

What Do Cyber Protection Teams Do?

What Do Cyber Protection Teams Do? Infosec is a booming field full of opportunity. Titles like “threat hunter” and “cyber operator” sound very exciting. But what do these jobs really entail? Mark Pomerleau at C4ISRNET wrote an excellent article giving a high-level...
Staying Safe Online, Part 4

Staying Safe Online, Part 4

Staying Safe Online, Part 4: VPNs and Smartphones Welcome to the fourth part of our series on internet safety. Previously, we’ve touched on general tips and social media,  Google privacy and online dating, and Windows and mobile wallets. Here, we’ll give...

Pin It on Pinterest