Thursday, May 25, 2017
united states computer emergency readiness team
backup

Backup Your Data Before Ransomware Strikes

Many users aren't in the habit of making an external backup and instead rely on the system's restore capability if something goes awry and data is lost. If the relevant system...
secure network

Secure Your Network Against Malware and Ransomware Attacks

With increasingly sophisticated and updated malware and ransomware emerging, networks need to continuously upgrade security and evolve risk reduction, breach detection and real-time, proactive security engagement. For every daylight digital innovation...
social network

Staying Safe on Social Networks

“We are what we pretend to be, so we must be careful about what we pretend to be.” (Mother Night; Kurt Vonnegut; Fawcett; 1961) It's even easier to be sociable on social media...
backup vs sync

File Synchronization Vs. File Backup

File Synchronization File-syncing is used in operating systems to perform effective backups. It is also used on dedicated platforms for file-sharing (such as Synchronize It!). Updated files are copied either in one...
brute force attacks

How to Secure Your Network Against Brute Force Attacks

Brute force attacks use strength rather than cunning to infiltrate a network. These attacks will use all methods systematically until the target has been infiltrated. They can be carried out either...

How to Prevent Ransomware: 21 Tips and Tricks

Nowadays ransomware prevention is very important thing to know. Having in mind that submitting the ransom might be the only option for recovering data, users should learn some tricks to keep...
webcam

Why You Should Disable Your Webcam

This subject was once considered paranoia, though events have proven that it is possible to spy on a user by hijacking a webcam. Of course, if there is hardware attached to...
malvertising

Report: Ransomware and Malvertising

The biggest cyber-threats in the last three months have been from ransomware and malvertising. The bill for the recent ransomware attack on the Hollywood Presbyterian Medical Center in California was $17...

The Evasion Techniques of the Zeus Trojan

The most impressive of the escape and evasion techniques employed by the Zeus trojan is its use of a stolen Digital Certificate. Every P.C running a Windows operating system is set...
heuristic algo

How Anti-virus Heuristic Detection Works

Metamorphic coding of a virus will not automatically protect against detection by heuristic analysis, though in some cases it is enough to prevent discovery by these methods. Where polymorphic code is...