Wednesday, April 24, 2019
mischa

Mischa Ransomware – Petya’s Best Friend

Overview of Petya ransomware In March, we covered the emergence of Petya trojan-ransomware; an original and dangerous threat. It was very virulent malware as it did not merely encrypt user files and...
web browser

Most Secure Web Browsers for 2016

Secure mainstream browsers are difficult to find, as seen in recent years with the increased complexity of malware and the inherent design flaws that need patching after release. A hardened or...

Dangers of Trojan Infections

The code of a trojan infection may – or may not – take effect immediately. The main purpose of a trojan is to infiltrate an operating system through misleading a user...

Security Flaws May Occur in Customized Smartphone Operating Systems

There are four basic levels that combine to make smartphones what they are: Application Layer; Operating System (O.S) Layer; Hardware Layer; Infrastructure Layer Each layer is dependent on those below it for operation. The Operating System...

How ZeroAccess Rootkit Takes Control Over PCs

To answer this question, it is necessary to look briefly at how this rootkit operates. The ZeroAccess rootkit is capable of differentiating between and installing on either Windows 32-bit or 64-bit...
backup vs sync

File Synchronization Vs. File Backup

File Synchronization File-syncing is used in operating systems to perform effective backups. It is also used on dedicated platforms for file-sharing (such as Synchronize It!). Updated files are copied either in one...
wifi security

Is Your Wireless Network Really Secure?

Wireless networks for small businesses by their nature have additional vulnerabilities to hard-wired networks. This should be kept in mind when deciding about technology for a business. The practical necessity and...
petya ransomware

Petya Ransomware – a Hardcore Threat to the Hard Drive

'Today we have launched the Petya Ransomwear Project'; this is a proud statement from the page that greets a visitor to the TOR website after being infected with this new trojan-ransomware....
social network

Staying Safe on Social Networks

“We are what we pretend to be, so we must be careful about what we pretend to be.” (Mother Night; Kurt Vonnegut; Fawcett; 1961) It's even easier to be sociable on social media...
malvertising

Report: Ransomware and Malvertising

The biggest cyber-threats in the last three months have been from ransomware and malvertising. The bill for the recent ransomware attack on the Hollywood Presbyterian Medical Center in California was $17...