Speaking of Malware
The Strongarm Blog

How to Spot Credential Phishing with Fake Security Certificates

May 24, 2017 | By John Schilling

Credential phishing is one of the easiest ways for attackers to make money, because it’s a numbers game. The more phishes you send out, the more bites you get. The more bites you get, the more money you make. For years, executives were the most...

MORE

Zero-Day Exploits: How to Protect Yourself in Four Simple Steps

May 1, 2017 | By John Schilling

Recently, a few of our users have reached out to ask what we think about the latest Microsoft zero-day exploit. In a nutshell, this exploit quietly installs malware by exploiting a serious vulnerability attackers found in Microsoft’s popular Office software. The attack comes in via...

MORE