1. Hundreds of old MS Office files increased by about 10kb

  2. Packet analysis of IRC traffic
  3. Is it safe to download an HTML file on an unknown website using something like Python's urllib.urlretrieve?

  4. What security risks are there in allowing someone to upload PHP scripts?

  5. Placeholder for domains?
  6. Do malicious files on old hard drives pose a risk?

  7. Will Running MEMZ or Wanna Cry in VirtualBox Harm Host Computer?
  8. Unusual GET Request

  9. How to stop USB Rubber Ducky?

  10. How to scan filesystem for suspicious PHP files?

  11. Unsigned windows driver

  12. Can BIOS malware be installed from OS?
  13. Reverse engineering utility required!
  14. What caused these massive spikes in malware sites detected by Google in July 2012 and January-February 2014?

  15. Android Apps Malware Dataset
  16. How to stop autogenerating PHP malware on GoDaddy shared hosting?(signature-index.html.bak.bak favicon_**.ico)

  17. Where to find malware and benign flow capture data?

  18. Need Security advice on virtualization and windows security
  19. Can a computer get infected with malware by viewing a PDF online?

  20. Install dualboot Windows to avoid viruses
  21. Why did hosts get infected if the endpoint protection product has a signature for that malware?
  22. How can an attacker alter precompiled SQL statements within a Windows executable?
  23. Odd PHP error referring to Fallaga Priv8 404 Shell when visiting a web site

  24. Malware added itself to Windows defender exclusion list

  25. Chromium Malware (possible) on my Linux Machine

  26. Indicator of Compromise - Mozilla Firefox - Malware Redirect
  27. How can I make sure if my computer is infected and know if I have to nuke it from orbit?
  28. does karabiner elements on Mac OSX contain or potentially contain malware?

  29. Skype opens base64-encoded JavaScript. What does it do?

  30. A Facebook impersonator uploaded pictures of me I never posted online. Now what?

  31. Is the VMware Unlocker 2 software safe?

  32. Unwanted macOS connection requests

  33. Impossible removing JS:Downloader-FHB trj

  34. How is it secure to open documents with embedded/linked fonts and images
  35. How secure is a Kali Linux Live USB

  36. Is there a real possibility of getting malware by “drive-by”?

  37. SSD Wipe to remove known & unknown malware
  38. Can visiting Pirate Bay itself give you malware?

  39. How do I safely inspect a suspicious email attachment?

  40. Knowing if a malware infected something else than the hdd or ssd

  41. Should I get an antivirus for Ubuntu?

  42. My local machine was infected with malware from a clients web server

  43. Is it secure to keep malware in filesystem of VMs?
  44. IAT Hooking questions?

  45. How to secure infected all-in-one pc?
  46. In-memory code signing
  47. How does malware load a dll from memory

  48. Kernel32.dll , Kernelbase.dll and Malware

  49. functioning ( behavioural based ) of an antivirus
  50. Getting a PHISH/Zmate.omna detection by Avira when I refresh my page, but online website scanners are showing that the page is clean
  51. Can the previewable option in file managers execute malware?
  52. Suspicious Autofill on Chrome

  53. Can an attacker add malicious instructions to a cracked Password Manager app to exfiltrate credentials ? (1Password, oneSafe, etc.)
  54. Frequent heavy CPU load from firefox browser -> malware?
  55. What is the risk of copy and pasting Linux commands from a website? How can some commands be invisible?
  56. Are there known incidents of Linux malware coming from unofficial repositories?

  57. Received SMS/MMS with suspicious link - what to do now?
  58. Is it dangerous to call spam phone numbers, even if you know they're spammers?
  59. Can you get a virus / malware just by plugging in a USB device?

  60. Can a virus infiltrate an empty (new) usb stick?
  61. How do I safely inspect a potentially malicious website?

  62. Are there technical reasons why state actors may be more able of carrying out malware cyberattacks against critical infrastructure, than individuals?
  63. Unambiguous terminology for different kinds of malware?

  64. Can malware have its own GRUB/boot-loader and use it to be active?

  65. How to prove that antivirus is capble of detecting and removing malware?
  66. How can I decrypt a Word document that I know the password to without opening it in a word processor?
  67. How is app repackaging attack possible if I only download from Google's play store?

  68. What are the best ways to fake a web server

  69. What does this malicious PHP Backdoor:PHP/Fobushell.G script do?

  70. How to safely store infected PDF file that I have created?

  71. How Do Rootkits & Other Low-Level Malware Still Manage to Load on Systems Protected by Secure Boot (and TB/MB)?

  72. Would using a QWERTY keyboard with DVORAK output cause keylogger to log DVORAK?
  73. svchost.exe has strange outbound tcp connections
  74. Is there anything that a regular user can do to help remove fake websites?

  75. Using linux to combat windows flash drive malware?

  76. Can you directly view a malicious PDF on Linux?

  77. Can a djvu file be dangerous?

  78. Can I get a malware on Windows without administrative rights?
  79. Samples of malware that trigger AV but are harmless

  80. Quarantine or add exclusion for malicious items?
  81. Regedit shows strange chinese characters in my system - should I be worried?

  82. Unknown Chinese characters in regitry

  83. Why arent all hackers traced ? ( network based attackers or malware which communicate with CNC servers)

  84. How Do antiviruses decide whether a file is to be quarantined or not?

  85. Antivirus settings: delete or quarantine the file?
  86. Can malware be dangerous even when quarantined?

  87. Does Windows Subsystem for Linux provide additional security (VM-like isolation) over running native Windows programs?

  88. Detecting malware-infected USB drives
  89. How should I more securely store files obtained by mirroring a website?
  90. Is it possible to get virus/malware by just connecting to an Android phone acting as a WiFi hotspot?
  91. Have I created some kind of malware?

  92. How does Mirai (or any IoT malware) perform the initial infection?
  93. Is OSX/MaMi a real malware or a simple filtering software?

  94. Yara rules not working in debian
  95. Is it possible to get malware through an incoming video/audio stream? (e.g. Omegle, Skype etc.)

  96. What is the best way for scanning possibly infected external drive in Debian?

  97. Why cant i run malware in my Virtual Environment
  98. How is a worm different from a virus?
  99. got red screen while calling fake support number
  100. How does this Wordpress site got infected with,,