
bartblaze.blogspot.com
Blaze's Security BlogA blog about malware and information security.
http://bartblaze.blogspot.com/
A blog about malware and information security.
http://bartblaze.blogspot.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Sunday
LOAD TIME
0.3 seconds
PAGES IN
THIS WEBSITE
18
SSL
EXTERNAL LINKS
32
SITE IP
172.217.6.65
LOAD TIME
0.336 sec
SCORE
6.2
Blaze's Security Blog | bartblaze.blogspot.com Reviews
https://bartblaze.blogspot.com
A blog about malware and information security.
Blaze's Security Blog: Ransomware: a Q&A
https://bartblaze.blogspot.com/2014/04/ransomware-q.html
Blog about internet and malware threats. Wednesday, April 2, 2014. A Q&A written by @bartblaze. What is their goal? How successful are they, and what is their recipe for success? Much like my previous article on botnets. This article will be a Q&A, a question and answer. Hopefully, we'll be able to clear up some of the mysteries behind ransomware. I have been able to interview experts in the anti-malware world. They will each give their opinion on this particular subject. Locks screen and asks for money.
Blaze's Security Blog: October 2013
https://bartblaze.blogspot.com/2013_10_01_archive.html
Blog about internet and malware threats. Friday, October 25, 2013. Unless you didn't have any internet access today, you must have heard about the compromise of PHP.net today. An excerpt:. One of the first confirmations that PHP.net. Was in fact compromised. Google Safe Browsing warning. You can read the full discussion on whether PHP was compromised or not here:. Https:/ news.ycombinator.com/item? Statements by PHP.net itself:. Http:/ php.net/archive/2013.php#id2013-10-24-2. Being redirected to a websit...
Blaze's Security Blog: C99Shell not dead
https://bartblaze.blogspot.com/2015/03/c99shell-not-dead.html
Blog about internet and malware threats. Wednesday, March 4, 2015. I recently got contacted on Twitter in regards to a hacked webpage:. Hey, maybe interesting for you: http:/ t.co/6rZUD1O1qZ. Found on hacked joomla page Got a lot of those files. All have same scheme. 8212; Florian Gümbel (@fgdesign) February 25, 2015. After I received the files two things became apparent:. The webserver (and thus the website) was infected with C99shell. The webserver was infected with other PHP backdoors. Detections aren...
Blaze's Security Blog: March 2014
https://bartblaze.blogspot.com/2014_03_01_archive.html
Blog about internet and malware threats. Monday, March 3, 2014. Browlock ransomware cases increasing. Browlock is (unfortunately) nothing new. It's a simple webpage that "locks" your browser and demands a certain amount (usually $/£/€ 100) to unlock it. You cannot exit out of the browser. Browlock typically gets delivered via malvertising (which is the user clicking on a malicious ad). Read more about Browlock here:. Browlock Ransomware Malvertising Campaign. Browser blocked by Browlock. Om uw computer t...
Blaze's Security Blog: December 2013
https://bartblaze.blogspot.com/2013_12_01_archive.html
Blog about internet and malware threats. Tuesday, December 31, 2013. To all my readers, I wish you a happy New Year! Stay tuned, as there will be more blog posts in 2014! The most important tips of 2013 were probably:. Patch your Java and Adobe or uninstall it if you don't need it. Same goes for their browser plugins or add-ons! Keep your browser of choice up-to-date. Install an antivirus and antimalware product and keep it up-to-date and running. Use NoScript in Firefox or NotScripts in Chrome. In this ...
TOTAL PAGES IN THIS WEBSITE
18
CISPA Bill Passed by Representatives Again – Trouble on the Horizon! | Secure Connexion
https://secureconnexion.wordpress.com/2013/04/22/cispa-bill-passed-by-representatives-again-trouble-on-the-horizon
CURE for your Security, Better Connexion! April 22, 2013. CISPA Bill Passed by Representatives Again – Trouble on the Horizon! The Cyber Information Sharing and Protection Act, AKA CISPA, has once again passed in the US House of Representatives. Reminder that this bill gives government agencies and their other agencies access to personal, private user data to help monitor for the presence of hackers. Now, when CISPA was first passed, Senate said NO! Will it completely stop hacker initiatives? Of course t...
Deobfuscating a Wicked-Looking Script | Kahu Security
http://www.kahusecurity.com/2015/deobfuscating-a-wicked-looking-script
Malicious Word Macro Caught Using Sneaky Trick →. Deobfuscating a Wicked-Looking Script. March 3, 2015. One of my security researcher friends passed along this PHP script to me. Let’s have a look. It looks like PHP ate some Perl and barfed it out. First thing I asked myself is, “does this even run? 8221; It looks like a mess but it actually runs just fine. This script makes clever use of bitwise operators. For example…. YzuZ=n ‘)’ / this equates to ‘G’. Or fix it up…. BIywY(x1o6Vm2, WFrkAj9, QcFS0u);.
Nyxbone - Malware Analysis && UnEthical Hacking
http://www.nyxbone.com/index.html
Malware Analysis & UnEthical Hacking. Ransomware Overview: Backup de una lista completa de este tipo de amenazas en 2016. "/. Análisis y pruebas de funcionamiento en exploits, malware y entornos inalámbricos."/. Encuentre toda la información sobre redes inalámbricas: WiBOG / WPA Cracking / etc. "/. Análisis de Malware, se realizan pruebas de funcionamiento sobre los virus y troyanos más destacados. "/. Metasploit: Dominando el Framework. Análisis de Malware / Malware Analysis. Troyano del tipo Ransomware...
Advantages and Disadvantages of Bring-Your-Own-Device (BYOD) in Education (mini-whitepaper) | Secure Connexion
https://secureconnexion.wordpress.com/2012/08/27/advantages-and-disadvantages-of-bring-your-own-device-byod-in-education-mini-whitepaper
CURE for your Security, Better Connexion! August 27, 2012. Advantages and Disadvantages of Bring-Your-Own-Device (BYOD) in Education (mini-whitepaper). BYOD is the technology philosphy and business/education policy of bringing your own device (mobile) or technology (shortened BYOT for laptops, iPads, etc.), and using it while at work or school. Therefore, the use in education can be very beneficial as well as troublesome. Of course, monitored by teachers, it can prove those benefits. Less confusion, sinc...
Passwords are Losing Trust; Hello Fingerprints, Hashes, Unique Codes | Secure Connexion
https://secureconnexion.wordpress.com/2013/01/21/passwords-are-losing-trust-hello-fingerprints-hashes-unique-codes
CURE for your Security, Better Connexion! January 21, 2013. Passwords are Losing Trust; Hello Fingerprints, Hashes, Unique Codes. One of the biggest vulnerabilities in computer security is the password. Let’s face it. Something’s got to give! What exactly will it take to authenticate somebody with their own personal information or data without being discovered or hacked? A pin or password is usually needed for devices…right? Many networking authentication proposals for authentication would only allow a c...
Updated Details: Gozi Malware Back with More Money Stealing & Sophistication | Secure Connexion
https://secureconnexion.wordpress.com/2013/04/20/updated-details-gozi-malware-back-with-more-money-stealing-sophistication
CURE for your Security, Better Connexion! April 20, 2013. Updated Details: Gozi Malware Back with More Money Stealing & Sophistication. It seems as if security firm, Trusteer, has identified a new variant of the Gozi financial malware. This one is more sophisticated and requires your attention. This new variant infects the Master Boot Record (MBR) on your computer — which is a boot sector software device that resides at the beginning of your hard drive that tells your computer how to boot up. Next post &...
Donations | Secure Connexion
https://secureconnexion.wordpress.com/donations
CURE for your Security, Better Connexion! If you would like to consider donating to Secure Connexion, please follow the ways below. We have many ways for anyone to donate to us:. Donations: any amount would be great via PayPal. Give it as a gift, please! Your kindness will be appreciated! Advantages and Disadvantages of Bring-Your-Own-Device (BYOD) in Education (mini-whitepaper) Secure Connexion. May 23, 2013. Leave a Reply Cancel reply. Enter your comment here. Address never made public). DHS Daily Repo...
Welcome back Ramnit – Anti-detection rootkit back in action | Secure Connexion
https://secureconnexion.wordpress.com/2013/03/16/welcome-back-ramnit-anti-detection-rootkit-back-in-action
CURE for your Security, Better Connexion! March 16, 2013. Welcome back Ramnit – Anti-detection rootkit back in action. Ramnit is the name of a rootkit family, which is composed of a sophisticated virus-mutated rootkit, which tends to infect files with polymorphic code and then locks them to disk (some versions lock to disk). Now, it has a troubleshooting module, increased anti-detection capability, enhanced encryption and malicious payloads, and better-written polymorphic code. Laquo; Previous post.
With the Rise of Coding, Comes the Rise of Malware | Secure Connexion
https://secureconnexion.wordpress.com/2013/05/01/with-the-rise-of-coding-comes-the-rise-of-malware
CURE for your Security, Better Connexion! May 1, 2013. With the Rise of Coding, Comes the Rise of Malware. I’m sure you might have read recent articles about how coding is going to be the ultimate skill. In the coming years. Seems like this might as well be true, so it’s being pushed with the various online schools being developed (the list is getting exhaustive). With this huge rise of training comes a huge rise of smarter hackers and malware writers. What is it about malware that seems so attractive?
What is Multifactor Authentication & Why YOU Need it? | Secure Connexion
https://secureconnexion.wordpress.com/2013/05/06/what-is-multifactor-authentication-why-you-need-it
CURE for your Security, Better Connexion! May 6, 2013. What is Multifactor Authentication and Why YOU Need it? Lately, there’s been a lot of buzz about multifactor authentication, especially with Twitter. Multifactor Authentication refers to the requirement of two or more pieces of information needed before allowing access to a specific account. Comes along. We just need to get rid of the weak. Password encryption we have now, and get something better. What more can be done for password security? I’ve ta...
TOTAL LINKS TO THIS WEBSITE
32
Bart Blancke Bank, Verzekeringen en Vastgoed
Bart Blancke 2011 • Webconcept by Nextmove.
Bart Blaszczyk - Web Developer and PHP Programmer
Pixel perfect design on solid technical foundations, I have a strong grasp on usability and user experience being an expert programmer at the same time. I can build the project using my own CMS, create a custom CMS solution that will meet your goals or simply use any popular software that you prefer, e.g. Wordpress. ExpressionEngine, vBulletin, phpBB. See my work. Zen Cart, VirtueMart, osCommerce, PrestaShop, OpenCart or my own e-commerce solution. See my work. I have the know-how needed in the developme...
Bart Brzozowski Law Offices
Law Offices of Bart Brzozowski. I have over twenty years of trial experience representing both plaintiffs and defendants in the areas of auto accidents, premises liability, products liability, consumer transactions and commercial litigation. My experience on both sides of the civil trial docket gives me a unique perspective in helping you resolve your case. Since I became a certified mediator in 1997, I have successfully mediated hundreds of cases. There is never a set-up fee or cancellation fee.
Blaze's Security Blog
Blog about internet and malware threats. The purpose of ransomware. Sunday, February 25, 2018. Fake Steam Desktop Authenticator steals account details. In this blog post, we'll have a quick look at fake versions of Steam Desktop Authenticator (SDA), which is a "desktop implementation of Steam's mobile authenticator app". Brought me to the attention of a fake version of SDA floating around, which may be attempting to steal your Steam credentials. Figure 1 - Fake SDA website. Indeed, it appears it also att...
SOCIAL ENGAGEMENT