- MUNI Hosting: A safe haven for phishing and credit card fraud
by ophelia on 5/31/20, 4:51 PM, with comments
- An anatomy of an advance-fee loan scam
by ophelia on 5/10/20, 4:04 PM, with comments
- A brief analysis of the COVIDSafe app released in Australia
by ophelia on 4/27/20, 10:37 PM, with comments
- 99WebHelp: Unwinding a Tech Support Scam with Osint
by ophelia on 4/27/20, 5:16 PM, with comments
- Domain Services: A domain name extension scam
by ophelia on 4/17/20, 1:44 PM, with comments
- Who is running the Pandemic Survival fear-mongering spam campaign
by ophelia on 4/12/20, 11:19 PM, with comments
- What BEC fraud is and how it goes hand in hand with phishing
by ophelia on 11/22/18, 7:20 AM, with comments
- Professional Help Needed for Law Firms Still Vulnerable to Phishing Attacks
by ophelia on 10/13/18, 2:07 AM, with comments
- One in three big law firms in Australia are vulnerable to phishing
by ophelia on 10/10/18, 1:01 PM, with comments
- Fraudsters Can Access Sensitive Information from Abandoned Domains
by ophelia on 9/4/18, 1:58 AM, with comments
- How to Combat Email Impersonation Scams
by ophelia on 6/19/18, 1:18 PM, with comments
- Why Outdated Anti-Phishing Advice Will Not Protect You from Phishing
by ophelia on 6/12/18, 1:24 PM, with comments
- Why Outdated Anti-Phishing Advice Still Leaves You Exposed to Phishing
by ophelia on 6/12/18, 1:27 AM, with comments
- An ode to passwords
by ophelia on 5/17/18, 3:10 AM, with comments
- Disposable Kali Linux Docker container with X support
by ophelia on 4/25/18, 4:54 AM, with comments
- Building a Privacy-Respecting and Threat-Blocking DNS Server
by ophelia on 12/5/17, 10:40 AM, with comments
- My favorite Pi-hole block lists protecting from malvertising and ransomware
by ophelia on 11/15/17, 5:05 AM, with comments
- November Workshop: Running the Pi-hole Network-wide Ad-blocker, and more
by ophelia on 11/2/17, 5:26 AM, with comments
- How Economists Can Help Protect Privacy
by ophelia on 10/25/17, 2:00 PM, with comments
- How We Tried 5 Privacy Focused Raspberry Pi Projects
by ophelia on 10/5/17, 4:39 AM, with comments
- 'Creep Shots' is a worrying new trend targeting women in public
by ophelia on 9/19/17, 9:07 AM, with comments
- We're creating a curated list of Awesome Privacy Conferences
by ophelia on 9/11/17, 3:25 AM, with comments
- Why you should pay for your AntiVirus software
by ophelia on 8/25/17, 1:11 AM, with comments
- Upcoming features of Subresource Integrity 2.x
by ophelia on 5/12/16, 6:50 AM, with comments
- Grand List of Incident Management Frameworks
by ophelia on 3/15/16, 1:24 PM, with comments
- What type of logs a successful SOC should monitor?
by ophelia on 3/8/16, 12:44 PM, with comments
- Compromising US Banks with Third-Party JavaScript Code
by ophelia on 2/11/16, 7:48 PM, with comments
- Scanning Website Assets for Subresource Integrity
by ophelia on 1/4/16, 11:10 PM, with comments
- Scan Websites for SRI Hash Usage with Sritest.io
by ophelia on 1/4/16, 10:56 PM, with comments
- Risk-driven Incident Response in Complex Environments
by ophelia on 12/7/15, 11:59 AM, with comments
- Tricking Google Authenticator TOTP with NTP
by ophelia on 11/11/15, 11:40 AM, with comments
- Bypassing Two-Factor Protected WordPress Logins
by ophelia on 11/11/15, 11:37 AM, with comments
- Encrypting Emails with PGP and Keybase
by ophelia on 11/3/15, 11:59 AM, with comments
- Checklist for Security Incident Response Teams
by ophelia on 10/5/15, 3:33 PM, with comments
- Credentials Found in the Ashley Madison Sources
by ophelia on 9/7/15, 4:39 PM, with comments
- Malware Injecting BitTorrent Mirrors
by ophelia on 8/5/15, 10:58 AM, with comments