Malware and Social Engineering
Countering Social Engineering, Phishing, and Scams
Comprehensive guide to identifying and neutralizing social engineering attacks, phishing campaigns, and digital scams, with specific focus on threats prevalent in Iran.
Desktop OS Hardening and Malware Prevention
Comprehensive guide to securing Windows, macOS, and Linux environments against state surveillance, malware, and physical seizure, specifically tailored for the Iranian threat landscape.
Incident Response and System Recovery
A comprehensive guide on detecting security breaches, responding to malware infections and account compromises, and safely recovering systems within the Iranian threat landscape.
Malware Analysis and Threat Detection Tools
A comprehensive guide to tools and techniques for detecting state-sponsored spyware (like Pegasus), analyzing suspicious files, and monitoring system integrity, tailored for the Iranian high-risk context.
Malware and Social Engineering Fundamentals
A foundational guide to understanding how malicious software and psychological manipulation are used to compromise Iranian users, covering spyware, phishing, and state-sponsored threats.
Mobile Security, Spyware, and Advanced Protections
Comprehensive guide to securing mobile devices against state surveillance, commercial spyware (Pegasus/Predator), and domestic malware in Iran. Includes hardening steps for Android/iOS and forensic verification methods.
Software Hygiene, Safe Browsing, and App Management
Comprehensive guide to maintaining device health through software updates, safe application sourcing (focusing on Iranian restrictions), and secure browsing habits.