Recently technical guidance was released for CIOs and CISOs on how to prepare for a ransomware attack. This guide was a joint effort of multiple Federal agencies to address the growing concern of ransomware. In, “How to protect your Networks from Ransomware,” they provide some suggestions for prevention and response. We have created a checklist below to help you based on their recommendations. You can review your current polices, procedures and plans to see if you are cover
A Justice Department indictment alleges a 28-year-old hacker from Ohio, created the FruitFly malware and spied on Apple computers for 13 Years. Phillip R. Durachinsky is a good example of why we have all the security protections in place and why it is important for everyone to take part in securing their systems. According to the Department of Justice indictment, Durachinsky spied on thousands of people, plucking millions of photos and other sensitive data from their computer
On October 24th, ransomware known as Bad Rabbit infected devices primarily in Russia and Ukraine. According to Kaspersky Lab, almost 200 targets have been hit. Those infected include the Russian media outlet Interfax, the Kiev metro system and the Odessa airport. One of the ways the attack spread was through a fake Adobe Flash Player update. Bad Rabbit is similar to Petya that spread earlier this year which encrypts files and demands a ransom to get them back. At the moment,
Ccleaner, an anti-malware program used by over 2 million users had been Trojanized (compromised) by hackers to deliver malware. You can't make this stuff up. The very tools you use to help prevent or cleanup malware can also be compromised resulting in the spread of malware. "Piriform, now owned by security firm Avast, says that its download servers were compromised at some point between August 15, when it released version v5.33.6162 of the software." Cisco Talos researche
The US government has concerns about using Kaspersky Labs Antivirus software. So much so that they have ordered the removal of it from all US government computers and suggested other organizations should follow their lead. The concern is that the Kaspersky Labs may be working with the Kremlin on cyberespionage operations and poses a risk to national security. Sen. Jeanne Shaheen leaves the situation vague and says they can't reveal the full extent of classified information t
Insiders have long been one of the biggest security concerns for organizations. People are known to be the weakest link in the chain of security for organizations. For example, an employee can execute malicious software or code that can lead to a large-scale security incident. Security practitioners have traditionally focused on better technical controls like anti-malware software and end-point security. However, this is only one layer of protection. Studies on ransomware
This time of year is sweet for hackers; IT folk are off, you’re on break and perfect targets for malware infestation and ID theft.
Even better, many email systems don’t filter bad emails very well. They can pass through or retain many bad emails in quarantine, especially on weekends or breaks, and if one looks good and fools you into even just looking at it, you’re up the creek.
These links are a small demonstration of a simple script in a web page, like the
Ransomware is becoming the largest threat to home and work computers. Ransomware basically encrypts your files and presents you, the user, with the option of playing to decrypt your files. Basically, your files are held hostage until you pay. What can you do? An ounce of prevention is worth a pound of cure. Many of the anti-virus / anti-malware software packages now come with some sort of anti-ransomware protection now.However, it is important to make sure the feature is t
I am often asked, “What is the best Antivirus or Anti-malware product?” My answer is often, do some research because the best Antivirus last year might not be the best this year. Plus, the Antivirus that catches the most potential viruses may also be the one that slows your machine down the most. This means there will be normal trade-offs of security versus performance. Many reviews on antivirus are done annually, and you can see the track record for the antivirus vendor. You