Thursday, February 23, 2017
united states computer emergency readiness team
petya ransomware

Petya Ransomware – a Hardcore Threat to the Hard Drive

'Today we have launched the Petya Ransomwear Project'; this is a proud statement from the page that greets a visitor to the TOR website after being infected with this new trojan-ransomware....
iot

Ransomware Welcomes the Internet of Everything

With everything becoming increasingly connected electronically, the IoT (the 'Internet of Things') provides a perfect breeding ground for ransomware. In 1999 technology expert Kevin Ashton conceived a vision like some device from...

The Use of Hashes in Signature-based Malware Detection

A hash is a fingerprint of a file that is unique for every file. It is almost impossible to compromise an operating system without changing a system file - and with...
secure network

Secure Your Network Against Malware and Ransomware Attacks

With increasingly sophisticated and updated malware and ransomware emerging, networks need to continuously upgrade security and evolve risk reduction, breach detection and real-time, proactive security engagement. For every daylight digital innovation...
ransomware evolution

Ransomware Evolution: Then and Now

Many centuries ago, humans learned to ride on the backs of animals to make travel faster, more efficient (especially with loads). After this the connection was made that a rock or...
identity theft

How to Protect Yourself Against Identity Scams

The IRS have passed the buck again by stating that the recent massive compromise is as a result of customers' own security failure. They are blaming the taxpayer for weak security...
malvertising

Report: Ransomware and Malvertising

The biggest cyber-threats in the last three months have been from ransomware and malvertising. The bill for the recent ransomware attack on the Hollywood Presbyterian Medical Center in California was $17...
mobile ransomware

Ransomware Goes Mobile

Ransomware is the fastest growing threat online today, raising many millions each year (and not for charity). After infiltrating a system, it encrypts or locks files and demands a ransom be...
protection

How to Protect Your Organisation from Insider Threats

Vulnerability to Insider Compromise Increased dependence on IT and networking in organizations brings both enhanced productivity and efficiency, but also rising parameters of vulnerability. The (now old) adage - the weakest part...
email

Keep Your Email Communication Private

Most of us use e-mail every day and we take it for granted – but how safe is it really? E-mail is like a traditional message - if it's opened, it can...