8 Actions Your Business Can Take Now to Avoid Paying a Ransom Later
The number of ransomware attacks have exploded in 2021 — and so, too, have the size of the ransoms. Here are eight actions that companies can take so they do not have to pay a big ransom to get their data back. The number of ransomware attacks have exploded in 2021. The month of July […]
A History of Ransomware
Ransomware is a type of malware in which the perpetrator threatens to commit a malicious act unless the victim pays a ransom. The simplest type of ransomware appears to lock the target system, although a person with reasonable knowledge of computers can usually resolve the problem without paying the ransom.
To Pay or Not to Pay: That is the Question That Ransomware Victims Must Answer
Colonial Pipeline Company recently paid $4.4 million dollars to get its data back after a ransomware attack, rekindling the debate of whether companies should give in to cybercriminals’ demands. Find out why some companies decide to pay the ransom while others do not. Most people never heard of the Colonial Pipeline Company before May 2021, […]
3 Things to Keep in Mind Before Moving More IT Operations to the Cloud
With the future looking brighter, companies are contemplating moving more IT operations to public clouds. Here are three things to keep in mind before doing so.
The Security Risks Associated with Cookies
Cookies are a common target for hackers because they represent a major vulnerability in web applications. Multi-factor authentication (MFA) is a traditional approach to solving this problem, but it’s becoming less effective as attackers devise ways of defeating it. Web developers are using new methods like Progressive Web Apps (PWAs) to defend against modern attacks […]
The “Android Update” that’s actually Malware
Researchers at Zimperium zLabs have discovered a sophisticated Android app that masquerades as a software update. It appears to be an update for the Android mobile operating system (OS), but it actually exfiltrates data about users and their mobile devices. This malware is similar to other Android apps that Google discovered in its Play Store […]
Microsoft Exchange Server Continues to be Hacked at an Alarming Rate
Microsoft has identified multiple 0-day attacks against on-premises versions of Microsoft Exchange Server. These attacks exploit vulnerabilities that allow attackers to access email accounts. They’re then able to install additional malware that provides them with additional capabilities through these accounts. The attackers include multiple state-sponsored groups that have targeted tens of thousands of Exchange servers […]
A Glimpse into a Trucking Company’s Ransomware Nightmare
A manager at a trucking company shares what it was like to be the victim of a ransomware attack. Here is his story and the lessons other businesses can learn from it.
Ethernet Technology: A Possible Comeback?
Ethernet is a family of wired technologies commonly used in local area networks (LAN) and wide area networks (WAN). It has been commercially available since 1980, but has been refined multiple times to support higher transmission rates, more nodes and longer distances while retaining much of its backward compatibility with older versions. Ethernet is still […]
PDF Viewers are Susceptible to these Attacks
The vast majority of PDF viewers are vulnerable to a variety of attacks, according to researchers at Ruhr University Bochum in Germany in a 2021 study. These techniques exploited standard features of PDF that are generally familiar to most hackers. In the most serious cases, researchers were able to execute code remotely, read data and […]