Wednesday, April 26, 2017
united states computer emergency readiness team
mischa

Mischa Ransomware – Petya’s Best Friend

Overview of Petya ransomware In March, we covered the emergence of Petya trojan-ransomware; an original and dangerous threat. It was very virulent malware as it did not merely encrypt user files and...
social network

Staying Safe on Social Networks

“We are what we pretend to be, so we must be careful about what we pretend to be.” (Mother Night; Kurt Vonnegut; Fawcett; 1961) It's even easier to be sociable on social media...
iot

Ransomware Welcomes the Internet of Everything

With everything becoming increasingly connected electronically, the IoT (the 'Internet of Things') provides a perfect breeding ground for ransomware. In 1999 technology expert Kevin Ashton conceived a vision like some device from...
email

Keep Your Email Communication Private

Most of us use e-mail every day and we take it for granted – but how safe is it really? E-mail is like a traditional message - if it's opened, it can...
backup vs sync

File Synchronization Vs. File Backup

File Synchronization File-syncing is used in operating systems to perform effective backups. It is also used on dedicated platforms for file-sharing (such as Synchronize It!). Updated files are copied either in one...
email protection

3 Ways To Protect Your E-mail Address From Spammers

Now, spam is not just a pain in the proverbial processor – it's a real live and kicking threat. Apart from having to constantly clean up the garbage, one careless click...
malvertising

Report: Ransomware and Malvertising

The biggest cyber-threats in the last three months have been from ransomware and malvertising. The bill for the recent ransomware attack on the Hollywood Presbyterian Medical Center in California was $17...
rogue software

What is Rogue Security Software, Risks and Protection

What is Rogue Security Software? Rogue Security Software, also known as Fake AV (Antivirus) Software, or Rogue Antivirus Software, is a malicious computer program which is illicitly promoted and distributed as a...
identity theft

How to Protect Yourself Against Identity Scams

The IRS have passed the buck again by stating that the recent massive compromise is as a result of customers' own security failure. They are blaming the taxpayer for weak security...
webcam

Why You Should Disable Your Webcam

This subject was once considered paranoia, though events have proven that it is possible to spy on a user by hijacking a webcam. Of course, if there is hardware attached to...