Blog

rss

Spydamonkey Digital Blog

Stay up to date and in touch with what's happening at Spydamonkey Digital and in the world of technology, online security, design and development.

The Five Inconvenient Truths of Web Design

The Five Inconvenient Truths of Web Design

  4 MIN READ  |     57 views  |     12 July 2020

Being a web designer isn't easy. Depending on your niche, it requires a combination of finely-tuned technical and visual skills. And it takes a major commitment in order to keep those skills relevant in an ever-changing industry. What's more, the proverbial rug can be pulled out from under us at any moment. Tried-and-true methods can turn to dust and great tools can disappear without a trace. Even industry-related legislation can throw everything into a tizzy. Taken together, it can all be very difficult to deal with - let alone thrive in such an environment. But it's not impossible. Part of the path to maintaining both success and sanity comes from embracing the things we learn from experience: the inconvenient truths. Over my 11+ years as a designer, I'd like to think that I've experienced quite a wild ride. In that spirit, I've put together a list of “truths” that, once understood, can help to make for a smoother journey.
newMalware.jpg

New Malware Miner Sneakily Hides When Task Manager Is Open

  1 MIN READ  |     333 views  |     27 August 2019

Meet “Norman” – a new variant of monero-mining malware that employs crafty tricks to avoid being spotted. After injection, it overwrites its entry in explorer.exe to conceal evidence of its presence. It also stops operating the miner when the PC’s user opens Task Manager (see image below). Re-injecting itself once Task Manager is not running.
Houdini.jpg

Houdini Worm targeting commercial banking customers

  2 MIN READ  |     165 views  |     1 August 2019

A new variant of Houdini Worm has been identified targeting commercial banking customers with campaigns containing malicious files. The variant takes five days to actively distribute phishing to victims with the aim of obtaining banking credentials which can be exploited by attackers to make fraudulent purchases. The email attachment contains an MHT file that can be utilised by threat operators in the same way as HTML files.
App-Shield.jpg

What Is Application Shielding?

  4 MIN READ  |     148 views  |     21 July 2019

Application shielding is mainly used to protect intellectual property and cut down on piracy; the techniques modify a service's application code, making it more difficult for someone to tamper with it, or to figure out how to remove digital rights locks and steal media like music or movie files.

Signup

    .