Tuesday, February 21, 2017
united states computer emergency readiness team
wifi security

Is Your Wireless Network Really Secure?

Wireless networks for small businesses by their nature have additional vulnerabilities to hard-wired networks. This should be kept in mind when deciding about technology for a business. The practical necessity and...
secure network

Secure Your Network Against Malware and Ransomware Attacks

With increasingly sophisticated and updated malware and ransomware emerging, networks need to continuously upgrade security and evolve risk reduction, breach detection and real-time, proactive security engagement. For every daylight digital innovation...
computer security

Secure Your Computer Against Malicious Macros

'Warning: This document contains macros'Using Microsoft Office documents of any format at work every day is a risky business. This is because of a convenient innovation which turned out to be...
malvertising

Report: Ransomware and Malvertising

The biggest cyber-threats in the last three months have been from ransomware and malvertising. The bill for the recent ransomware attack on the Hollywood Presbyterian Medical Center in California was $17...
backup

Backup Your Data Before Ransomware Strikes

Many users aren't in the habit of making an external backup and instead rely on the system's restore capability if something goes awry and data is lost. If the relevant system...
ransomware evolution

Ransomware Evolution: Then and Now

Many centuries ago, humans learned to ride on the backs of animals to make travel faster, more efficient (especially with loads). After this the connection was made that a rock or...
petya ransomware

Petya Ransomware – a Hardcore Threat to the Hard Drive

'Today we have launched the Petya Ransomwear Project'; this is a proud statement from the page that greets a visitor to the TOR website after being infected with this new trojan-ransomware....
web browser

Most Secure Web Browsers for 2016

Secure mainstream browsers are difficult to find, as seen in recent years with the increased complexity of malware and the inherent design flaws that need patching after release. A hardened or...
heuristic algo

How Anti-virus Heuristic Detection Works

Metamorphic coding of a virus will not automatically protect against detection by heuristic analysis, though in some cases it is enough to prevent discovery by these methods. Where polymorphic code is...

The Evasion Techniques of the Zeus Trojan

The most impressive of the escape and evasion techniques employed by the Zeus trojan is its use of a stolen Digital Certificate. Every P.C running a Windows operating system is set...