Speaking of Malware
The Strongarm Blog

How to Spot Credential Phishing with Fake Security Certificates

May 24, 2017 | By John Schilling

Credential phishing is one of the easiest ways for attackers to make money, because it’s a numbers game. The more phishes you send out, the more bites you get. The more bites you get, the more money you make. For years, executives were the most...


Zero-Day Exploits: How to Protect Yourself in Four Simple Steps

May 1, 2017 | By John Schilling

Recently, a few of our users have reached out to ask what we think about the latest Microsoft zero-day exploit. In a nutshell, this exploit quietly installs malware by exploiting a serious vulnerability attackers found in Microsoft’s popular Office software. The attack comes in via...