Sunday, December 17, 2017
petya ransomware

Petya Ransomware – a Hardcore Threat to the Hard Drive

'Today we have launched the Petya Ransomwear Project'; this is a proud statement from the page that greets a visitor to the TOR website after being infected with this new trojan-ransomware....
ransomware evolution

Ransomware Evolution: Then and Now

Many centuries ago, humans learned to ride on the backs of animals to make travel faster, more efficient (especially with loads). After this the connection was made that a rock or...
backup vs sync

File Synchronization Vs. File Backup

File Synchronization File-syncing is used in operating systems to perform effective backups. It is also used on dedicated platforms for file-sharing (such as Synchronize It!). Updated files are copied either in one...
social network

Staying Safe on Social Networks

“We are what we pretend to be, so we must be careful about what we pretend to be.” (Mother Night; Kurt Vonnegut; Fawcett; 1961) It's even easier to be sociable on social media...

The Evasion Techniques of the Zeus Trojan

The most impressive of the escape and evasion techniques employed by the Zeus trojan is its use of a stolen Digital Certificate. Every P.C running a Windows operating system is set...
webcam

Why You Should Disable Your Webcam

This subject was once considered paranoia, though events have proven that it is possible to spy on a user by hijacking a webcam. Of course, if there is hardware attached to...
secure network

Secure Your Network Against Malware and Ransomware Attacks

With increasingly sophisticated and updated malware and ransomware emerging, networks need to continuously upgrade security and evolve risk reduction, breach detection and real-time, proactive security engagement. For every daylight digital innovation...

Dangers of Trojan Infections

The code of a trojan infection may – or may not – take effect immediately. The main purpose of a trojan is to infiltrate an operating system through misleading a user...
wifi security

Is Your Wireless Network Really Secure?

Wireless networks for small businesses by their nature have additional vulnerabilities to hard-wired networks. This should be kept in mind when deciding about technology for a business. The practical necessity and...
brute force attacks

How to Secure Your Network Against Brute Force Attacks

Brute force attacks use strength rather than cunning to infiltrate a network. These attacks will use all methods systematically until the target has been infiltrated. They can be carried out either...