7 Articles

Malware and Social Engineering

7Articles
IntermediateEN

Comprehensive guide to securing Windows, macOS, and Linux environments against state surveillance, malware, and physical seizure, specifically tailored for the Iranian threat landscape.

Read Article
AdvancedEN

A comprehensive guide to tools and techniques for detecting state-sponsored spyware (like Pegasus), analyzing suspicious files, and monitoring system integrity, tailored for the Iranian high-risk context.

Read Article
AdvancedEN

Comprehensive guide to securing mobile devices against state surveillance, commercial spyware (Pegasus/Predator), and domestic malware in Iran. Includes hardening steps for Android/iOS and forensic verification methods.

Read Article