The Evolution of Ransomware
Ransomware has been dominating the news for several weeks, and is likely to stay in the news for most of the year. Ransomware is a distinct type of cyber attack, in that it extorts payment from the victim in exchange […]
Ransomware has been dominating the news for several weeks, and is likely to stay in the news for most of the year. Ransomware is a distinct type of cyber attack, in that it extorts payment from the victim in exchange […]
2015 was quite a year! Hacks and ransomware got personal. APT attacks and cybercrime-as-a service became widespread. The scary future of IoT hacking became a reality with the demonstration of self-driving car hacks. And, a new threat vector of mobile devices
You’ve probably heard about the serious security problems flowing from email phishing scams. As we find ourselves embedded in the Christmas season, security teams around the globe are now on high alert regarding phishing attempts within their organizations and targeted
We phish you a Merry Christmas and a Happy New Year Read More »
When your everyday life is all about information security, you start to see patterns that may not be so obvious to others. Each year, I take my best shot at describing these trends and making predictions for the coming year.
Ransomware has come back into the spotlight, with a Krebs on Security report highlighting a recent attack targeting Linux Web servers—in addition to consumers and business users. Though ransomware itself isn’t anything new, this approach is unique in that after
Ransomware is nothing new. The first known ransomware surfaced in 1989. However, it took the Internet revolution along with automated online payment systems before organized cyber gangs saw that ransomware could become a giant cash cow. We’re talking big money
The days of the traditional mafia seem to be numbered–at least as its depicted in movies or on TV. Goodfellas has been replaced by Blackhat as organized crime syndicates evolve to master online crime. It is safer and offers an equal
Goodbye ‘Goodfellas’, hello ‘Blackhat’: The evolution of crime Read More »
Every day there seems to be a new malware threat that we hear about, from remotely controlling cars and medical equipment, to attacks on well-known security vendors such as Kaspersky Lab and Bitdefender. Each threat seems to be bigger and
We’ve been conditioned to believe that our malware defenses are adequate as long as we keep the software constantly updated to recognize and detect known threats. The approach is inherently reactive and functions essentially on the premise of “detect and
Cylance demonstrates why prevention is better than detection Read More »
There are two persistent truths about data. First, it’s a matter of “when” not “if” you will experience some sort of catastrophic data loss. Second, lack of preparation virtually guarantees that a catastrophic data loss will occur when you least
Protect your cloud and on-premise data with CoreBDR Read More »