malware

  1. Regedit shows strange chinese characters in my system - should I be worried?
  2. Options for securely storing files obtained by mirroring website?
  3. Anti-Virus for MongoDB and GridFS

  4. Can Windows 10 bootable USB drive get infected while trying to reinstall Windows?
  5. CloudFlare - prompted for "attention required"
  6. Pop up in Facebook built-in browser

  7. Was redirected from MS Outlook to a phishing site. Need independent opinion on whether or not my computer is compromised

  8. My website is blacklisted by Kaspersky. Does that mean it's infected?
  9. Getting started with tracing malvertising placement in Chrome or Firefox
  10. How to ensure Nuget Packages are safe for confidential information?
  11. Will converting a MBR disk to GPT, formatting and the converting back to MBR remove a infected boot record.
  12. How can empty USB sticks contain malware?
  13. I accidentally installed an adware filled Firefox [solved]

  14. Strange browsing problem, unknown images
  15. Is this app DEV C++ safe?

  16. Rootkit identification?

  17. I found this javascript on a webpage, is it a browser based cryptominer?

  18. Can the previewable option in file managers execute malware?
  19. Where can I get hashes of ransomware malware for research purposes?
  20. Where can I get hashes of ransomware malware?
  21. Ad window popping up on Windows 10. Am I infected?

  22. How to edit a Hex code without corrupting the file [in bypassing av]?
  23. how to create a wrapper for an executable file

  24. Unexplored/Ongoing challenges in Malware Classification?
  25. Will Running MEMZ or Wanna Cry in VirtualBox Harm Host Computer?

  26. Vault 8: which consequences does the release have?
  27. Can a Virtualbox ISO and my host machine get infected?

  28. How to distinguish malware from system crash?
  29. Never believed BadBios...but do now...is there help?

  30. What should you do if you catch encryption ransomware mid-operation?

  31. How can antivirus companies analyze the large amount of samples that they receive?

  32. Indicator of Compromise - Mozilla Firefox - Malware Redirect

  33. Knowing if a malware infected something else than the hdd or ssd

  34. Why is JS:Cryptonight considered a virus?

  35. IAT Hooking questions?

  36. question about clean reinstallation of infected windows 7 (nuke from orbit approach)
  37. Weird Registry found
  38. How many UDP packets is too many?
  39. Applicability/Purpose of Malicious .dll Injected Into Browsers

  40. Is malware altering my destination ip
  41. Finding a specific malware sample for malware analysis purposes
  42. Can an infected device within the LAN still be a threat if turned off?

  43. Suspicious Skype IP connection

  44. Monitoring setup compromising online privacy
  45. Obfuscated php code found on wordpress folder

  46. How to make my basic Java Server secure against hackers?

  47. Given a malware's name or signature, how can I know of my current installation of Kaspersky antivirus knows about it?
  48. Unsigned windows driver
  49. How to stop USB Rubber Ducky?

  50. Re: Intel IME\physical-access exploits - Has a Manufacturer ever (unintentionally) released malware-infected PC Components?
  51. What does this downloaded JS malware do?

  52. Is it possible to make my host completely safe from the virtual machine (where I will do malware analysis)?
  53. Can flash drive content leak to intenret?
  54. C++ standard library use in malware
  55. How does malware connect to FTP servers without revealing credentials to the victim?

  56. Pirate Bay Search Appearing in Chrome

  57. Can data be stolen from RAM in use
  58. CoinHive Bitcoin Mining
  59. One-time mystery redirect from one of our pages
  60. Obfuscated JavaScript from an email

  61. How is malware distributed within zip files?
  62. How do exploit kits enumerate or fingerprint their targets?

  63. What causes the "This site may be hacked" or "This site ahead contains malware" messages?
  64. What are easy checks to identify malware in Python code?
  65. How does someone check for malware in his machine's firmware?

  66. How to kill a process with multiple threads?

  67. Anyone heard of this site and was it safe?
  68. Question about potential ISO infection and ISO verification

  69. Is there any malware capable of updating itself?

  70. Malware sandbox detection

  71. Can malicious communication be hidden reasonably well in encrypted network traffic?
  72. Cryptomining Malware - Ubuntu - Stratum tcp

  73. How safe are Firefox addons from official mozilla.org site?

  74. Is restricting access to file content a way of securing sensible but day to day needed information from 3rd party software?

  75. Are we safe from infection of Bad Rabbit?
  76. Does a Virtual Machine stop malware from doing harm?
  77. How is the file overlay read by an exe/virus?
  78. How to make my homemade program not come up with security warnings?
  79. Building software safely for malware-free distribution

  80. Does C# code running with PowerShell Add-Type set off anti-virus?

  81. Does clicking "no" to "Do you want to allow the following program ... to make changes to this computer" mean I'm safe?

  82. Could a private key from JavaScript WebCrypto resist a malware attack?
  83. Is a VM safe to run a simple virus on?
  84. Safe to connect to external drive?

  85. How are apps on the Play Store infected by malware?
  86. How to get the statistics of users opening the attachment in a phishing mail during a social engineering campaign test?

  87. Malicious favicon icon?

  88. Can worms delete your network?
  89. Do virus author's purposely speak in broken English to avoid linguistic evidence?

  90. Is it safe to install CCleaner now?

  91. How to really identify malware (virus)?

  92. Is it safe to use "Iguana Tex"? Why does it trigger a virus report?
  93. Malware and Kerberos Authentication

  94. How to efficiently locate malware on an endpoint?

  95. limiting automated domain creation by malware
  96. Will changing the Wifi router fix a hijacked Wifi problem?
  97. Botnet callbacks to coin mining sites - how to act?

  98. Unusual case of Microsoft Calculator
  99. How to report getting an offer to put malware in my code

  100. Malware Analysis for Internet of Things Malware