Blog Posts Tagged with "Ransomware"


Don’t Be a Victim – Fight Ransomware Attacks with These Proven Steps

July 27, 2016 Added by:Hatem Naguib

There is certainly no shortage of cyber-attacks in the headlines, and none more prevalent than ransomware attacks. These bold attacks encrypt user files, then demand a ransom in exchange for decrypting the files and restoring access to the original owner.

Comments  (0)


BadBlock Ransomware Encrypts Windows System Files

June 06, 2016 Added by:Ionut Arghire

Dubbed BadBlock, a new ransomware doesn’t stop at encrypting the user’s photos, videos, and images, but does the same for Windows system files as well, which ultimately results in the computer being no longer usable.

Comments  (0)


Avoiding Ransomware with Strong Endpoint Security

May 26, 2016 Added by:Dean Dyche

Ransomware attacks are growing in volume and sophistication. To best defend against ransomware, users must ensure that their machines remain up to date with the latest patches and security updates.

Comments  (0)


Nemucod Malware Downloader Evolves into Ransomware

April 26, 2016 Added by:Ionut Arghire

Nemucod, a previously known JavaScript malware family designed to download additional malicious software onto the compromised computers, has evolved into ransomware and is now using 7-Zip to encrypt its victims’ files.

Comments  (0)


U.S. and Canada Issue Joint Alert on Ransomware

April 06, 2016 Added by:Ionut Arghire

Ransomware has recently become one of the biggest cyber threats to both end users and enterprises, and the United States DHS and the Canadian Cyber Incident Response Centre (CCIRC) have released a joint alert on ransomware threats.

Comments  (0)


Protecting Yourself (and Your Organization) from Ransomware

April 04, 2016 Added by:Dan Lohrmann

While media attention has focused on global terrorist incidents and the presidential primaries, a growing number of business emergencies caused by ransomware are sweeping the world. The risk of this situation escalating into a significant public- or private-sector crisis is growing.

Comments  (0)


Security Pros Not Confident in Ability to Fight Ransomware

April 03, 2016 Added by:Ionut Arghire

Only 38 percent of security professionals are "very confident" in their company’s ability to successfully deal with the increasing ransomware threat, a new survey reveals.

Comments  (0)


OSX Ransomware Offered for Sale in the Underground

February 10, 2016 Added by:Idan Aharoni

Inteller has identified a new Ransomware malware being offered for sale in the underground, dubbed "GinX", which encrypts important and sensitive files on the victim's computer and which targets not only Windows operating systems, but MacBook's OSX as well.

Comments  (0)


Common Malware Types: Cybersecurity 101

December 12, 2012 Added by:Fergal Glynn

The amount and variety of malicious programs out there is enough to make your head spin. This blog post will break down the common types of malicious programs and provide a brief description of each...

Comments  (0)


No Surprise - Ransomware On the Rise

October 04, 2012 Added by:Robert Siciliano

Data can sometimes be held hostage with the help of ransomware, software that infiltrates your com­puter when you download an infected attachment or clicking a link within the body of an email. You can also get ransomware simply by visiting the wrong website, in what is called a drive-by...

Comments  (1)


Analyzing Desktops, Heaps, and Ransomware with Volatility

September 24, 2012 Added by:Michael Ligh

This post discusses the undocumented windows kernel data structures for desktop objects and desktop heaps. You'll see how to use memory forensics to detect recent malware including the ACCDFISA ransomware and Tigger variants...

Comments  (0)


FBI and IC3 Issue Advisory on Revetion Ransomware

August 10, 2012 Added by:Headlines

Reveton is drive-by malware and unlike many viruses which activate when users open a file or attachment. Reveton can install itself when users simply click on a compromised website. Once infected, the computer immediately locks, and the monitor displays a screen stating there has been a violation of federal law...

Comments  (0)


Citadel Trojan Variant Evades Virtual Machine Analysis

June 28, 2012 Added by:Headlines

"When a virtualized environment detected, unlike many other Trojans that stop to work, Citadel will continue to operate... It will generate a unique-machine dependent domain name (obviously fake) and tries to connect to this server (unsuccessfully), making it to believe that the bot is dead..."

Comments  (1)


Citadel Malware Delivers Reveton Ransomware to Extort Money

May 31, 2012 Added by:Headlines

A new Citadel malware platform is being used to deliver ransomware named Reveton, which lures the victim to a drive-by download website, and the ransomware is installed. The computer then freezes and a screen is displayed warning the user they have violated United States Federal Law...

Comments  (0)


Trojans Dominate New Malware Development Sampled

May 07, 2012 Added by:Headlines

In the first quarter of 2012 alone, six million new malware samples were created, following the trend of increasingly of previous years. Trojans set a record as the preferred category of cybercriminals for carrying out information theft, representing 80 percent of new malware...

Comments  (0)


The Evolution of Endpoint Attacks

February 22, 2011 Added by:Don Eijndhoven

Endpoint protection will remain the name of the game, and what software vendors are doing right now isn't working. Its a failing approach that’s becoming increasingly obvious with each new report of a major breach. A change needs to be made before Organized Crime realizes its full potential...

Comments  (3)

Page « < 1 - 2 > »