Monday, August 21, 2017
petya ransomware

Petya Ransomware – a Hardcore Threat to the Hard Drive

'Today we have launched the Petya Ransomwear Project'; this is a proud statement from the page that greets a visitor to the TOR website after being infected with this new trojan-ransomware....
protection

How to Protect Your Organisation from Insider Threats

Vulnerability to Insider Compromise Increased dependence on IT and networking in organizations brings both enhanced productivity and efficiency, but also rising parameters of vulnerability. The (now old) adage - the weakest part...
mischa

Mischa Ransomware – Petya’s Best Friend

Overview of Petya ransomware In March, we covered the emergence of Petya trojan-ransomware; an original and dangerous threat. It was very virulent malware as it did not merely encrypt user files and...
online password

How to Strengthen Your Online Passwords

In Ancient Egypt, Words had Power. Names were the most important, potent words of all. At the end of Life, to pass beyond the water and enter the Afterlife it was...

Dangers of Trojan Infections

The code of a trojan infection may – or may not – take effect immediately. The main purpose of a trojan is to infiltrate an operating system through misleading a user...
mobile ransomware

Ransomware Goes Mobile

Ransomware is the fastest growing threat online today, raising many millions each year (and not for charity). After infiltrating a system, it encrypts or locks files and demands a ransom be...
computer security

Secure Your Computer Against Malicious Macros

'Warning: This document contains macros' Using Microsoft Office documents of any format at work every day is a risky business. This is because of a convenient innovation which turned out to be...
secure network

Secure Your Network Against Malware and Ransomware Attacks

With increasingly sophisticated and updated malware and ransomware emerging, networks need to continuously upgrade security and evolve risk reduction, breach detection and real-time, proactive security engagement. For every daylight digital innovation...
backup vs sync

File Synchronization Vs. File Backup

File Synchronization File-syncing is used in operating systems to perform effective backups. It is also used on dedicated platforms for file-sharing (such as Synchronize It!). Updated files are copied either in one...
email protection

3 Ways To Protect Your E-mail Address From Spammers

Now, spam is not just a pain in the proverbial processor – it's a real live and kicking threat. Apart from having to constantly clean up the garbage, one careless click...