A basic diagram of what Phishing boils down to.

What is it?

Phishing (pronounced "fishing") is the process of "fishing" for more information about a person, often by posing as a source they would have no qualms about giving it to. Since the inception of the consumer, internet phishing has gone hand in hand with it. And as the internet has advanced, so too has the complexity of these scams. It is not uncommon these days to get extremely convincing emails from these con-a...
Thursday August 16th, 2018Read More
A Quick Change Of Format

We've been watching the statistics on these security blog posts, and they are among our least read content, so we're going to mess with the content a little. Instead of taking more of a marketing/newsletter angle with it, let's get nitty gritty with some things we at Armor have actually encountered in the wild.

Today's topic is:

How Did They Get Into My Website,
And What Did They Do?

Did you know that you can put a PHP shell inside a JPEG fil...
Tuesday August 7th, 2018Read More


INTRODUCTION

Here’s a clever new twist on an old email scam that makes the con far more believable. The message claims to have been sent from a hacker who’s compromised your computer and used your webcam to record a video of you while you were watching porn. The sender threatens to release the video to all your contacts unless you pay a Bitcoin ransom. The new twist? The email references a real password previously tied to the recipient’s email address.

Example Sextort...
Wednesday August 1st, 2018Read More
The Four Phone Accessories You Should be Using

1. Durable Cases

The OtterBox Defender Series Case, shown in the color Vinyasa.

Even though many people are opting out of repairing their phones due to many cellular service providers offering free upgrades, phones are still typically a huge investment. With the iPhone 8 starting at $699 and the iPhone X a whopping $999, it’s no surprise people are dishing out extra money on protecting their investments. Two of the leaders, and arguab...
Tuesday July 31st, 2018Read More
Pixels, The Unit of Measurement

Pixels: smaller than the point of a needle, able to be nearly 200,000 different colors, and something you stare at basically all day. Pixels are everywhere, from your TV screen to the screen on your smartphone, and even the print on the business cards in your wallet. Each one of these displays is created through rows and columns of pixels. In each traditional pixel, there are three separate color values: Red, Blue, and Green (also known as RGB). These pixels ar...
Thursday July 26th, 2018Read More
E3 season has come and gone, and a ton of major announcements were made throughout the conferences this year. Check out the Armor Techs' E3 Recap below, and let us know if there are any games you're looking forward to from this years E3!

Electronic Arts (EA) Conference

An inside look at the E3 Conference.

EA's Conference was much of the same as most years. They started by showing us Battlefield 5. They then showed the new Madden and the world cup mode in FIFA. They also show...
Monday July 23rd, 2018Read More


Real Life in a Virtual World

"LOOK OUT!" This phrase has preceded countless catastrophes. It is one of the last things you want to hear when on the worksite. "How can we prepare for this?," a question all doctors ask themselves. "How can I reach these kids?," echoes through the hallways of schools. There are countless scenarios you have to prepare for: using explosives to bore a tunnel, performing complex surgeries, or even teaching kids in the classroom. We ...
Wednesday July 18th, 2018Read More


INTRODUCTION

Every week, someone brings a device into Armor because of malware. Every day, the AV-TEST Institute registers over 350,000 new malicious programs (malware) and potentially unwanted applications (PUA). These are examined using the analysis tools Sunshine and VTEST, classified according to their characteristics and saved. Visualisation programs then transform the results into diagrams that can be updated and produce current malware statistics.
 

And that old adage abou...
Tuesday July 17th, 2018Read More


INTRODUCTION

The problems with a password are obvious: the login system was first designed for time-sharing computers in the 1960s, working on mainframes that took up an entire lab. To use the computer, you tapped in your login name and password, which told the computer who was sitting at the terminal and which files to make available. Stealing someone’s password was good for a practical joke, but not much else: there was only one computer where you could use it, and not much person...
Thursday July 12th, 2018Read More
Introduction to GDPR

If you're even a semi-regular internet user, you've probably seen this in the last month: you log into your favorite service, like Facebook or Twitter, and see a huge notification, "We have updated our privacy policy!" Why all of a sudden, and why is EVERYONE updating their policy right now? The answer to that is the European Union's new privacy laws called the General Data Protection Regulation (or GDPR).

Now, before we break into GDPR and what i...
Tuesday July 10th, 2018Read More

Archive Older