Ransomware

Petya Ransomware: Is your data at risk?

Petya Ransomware: Is your data at risk?

A new ransomware named Petya hit high-profile targets in multiple countries, including the United States, on Tuesday. Tens of thousands of infections have been reported globally, just one month after the WanaCry outbreak.

WannaCry Ransomware: Is Your Business At Risk?

WannaCry Ransomware: Is Your Business At Risk?

You’d be hard-pressed to miss last week’s biggest headline, the WannaCry cyber-attack sent shockwaves around the globe. Businesses of all sizes and even police departments found themselves crippled without warning. 

Why System Updates Are Important!

Why System Updates Are Important!

A MASSIVE RANSOMWARE attack spread across the globe early Friday morning, locking up thousands of hospital, telecommunications, and utilities systems in nearly 100 countries. The attack used data stolen from the NSA to exploit vulnerabilities in Microsoft Windows and deliver the WanaCrypt0r ransomware. The demand was for $300 per PC. 

Spring Clean your PC, Remove & Prevent Malware

Spring Clean your PC, Remove & Prevent Malware

Cyber criminals frequently and automatically scan websites and PCs with different types of malware, to see if there are vulnerabilities they can use to gain entry to your system. Outdated programs provide these cyber criminals with an easy path to your computer.

How to stay safe and secure online in 2017

How to stay safe and secure online in 2017

One of the few industries in the world that will never see budget cuts is security. As the world grows ever more complex and connected, our valuable information is increasingly exposed to malicious actors around the world.

How to Avoid Getting Spyware on Your Computer

How to Avoid Getting Spyware on Your Computer

Using spyware, hackers can record your keystrokes, take pictures of your desktop, read your emails, make copies of your files, and much more. Spyware is a type of malware that runs in the background, without your knowledge. It collects information about your activities on the computer, sending the data to hackers through your Internet connection.

How to prevent malware infection

How to prevent malware infection

Yes, it’s possible to clean up an infected computer and fully remove malware from your system. But the damage from some forms of malware, like ransomware, cannot be undone. If they’ve encrypted your files and you haven’t backed them up, the jig is up. So your best defense is to beat the bad guys at their own game.

8 Signs Your Computer Might Be Infected with Malware

8 Signs Your Computer Might Be Infected with Malware

Anti-malware software plays an important role in the battle against cybercrime. However, it is not infallible. Cybercriminals are constantly releasing new malware programs or variants of existing ones, and it takes a while for anti-malware software companies to update their products to defend against them.

Cloud Hosting vs. File Servers: A Pros and Cons Analysis

Cloud Hosting vs. File Servers: A Pros and Cons Analysis

With cloud computing well into the mainstream and steadily replacing roles currently filled by traditional server architecture, it's time to ask the big question: can cloud hosting replace traditional file servers for storing and sharing files between employees in your organization? 

Crysis Ransomware Infects Windows, Mac, and VMware Machines

Crysis Ransomware Infects Windows, Mac, and VMware Machines

The Crysis ransomware is quickly yet quietly spreading to businesses across the globe. Even though it is more common and destructive than the Locky ransomware, Crysis has not received nearly as much press attention.

Why Malvertising Might Show Up on Your Favorite Website

Why Malvertising Might Show Up on Your Favorite Website

The notion that your computer might get a malware infection when you simply visit one of your favorite websites might be enough to give you nightmares. But it is a very real possibility. Cybercriminals are increasingly posting malicious advertising, or malvertising, on legitimate websites in order to spread malware.

How to Protect Your Business from Ransomware Attacks

How to Protect Your Business from Ransomware Attacks

The number of ransomware attacks is increasing at an alarming rate, making ransomware the biggest cyber threat that businesses are facing today. To see this disturbing trend, you only have to turn back the clock to the beginning of 2016.

BACK UP DON'T PAY UP!

BACK UP DON'T PAY UP!

When it comes to ransomware, it’s not the ransom that’s so damaging to your business. It’s the downtime.  Just ask the folks at Hollywood Presbyterian Medical Center.

Ransomware spreads via removable drives

Ransomware spreads via removable drives

Zcryptor is a new type of ransomware that unlike it's predecessors exhibits worm-like behavior. This ransomware leverages removable and network drives to propagate itself and affect more users.

Hackers Including Home Addresses to Lure Victims in Phishing Scams

Hackers Including Home Addresses to Lure Victims in Phishing Scams

Spear phishing con artists are becoming more clever and sophisticated in their attempts to trick people into falling for their scams. For instance, they now sometimes include the intended victims' home addresses to make their spear phishing emails seem more legitimate.

How to Protect Your Business from the Locky Ransomware

How to Protect Your Business from the Locky Ransomware

As TrendMicro predicted, hackers are increasingly using ransomware to encrypt businesses' files and hold them for ransom. As a result, headlines about these attacks abound in print and electronic media, making them seem almost routine.  In 2016 there have been over 40 new families of crypto ransomware discovered.

Hospital Pays Hackers a Ransom to Regain Control of Its Computers

Hospital Pays Hackers a Ransom to Regain Control of Its Computers

February 5, 2016, started out like any other day for the doctors, nurses, and other staff members at the Hollywood Presbyterian Medical Center in Los Angeles, California. But by the end of the day, many of them could no longer access or update patients' medical records. Nor could they send or receive emails. When the hospital's IT department investigated, it found that the computer systems were infected with ransomware.

Ransonware Hits The Mac

Ransonware Hits The Mac

It was revealed that KeRanger is the first real Mac ransomware, and it’s not just theoretical. It’s in the wild and something users should take seriously.