Saturday, September 22, 2018
ransomware evolution

Ransomware Evolution: Then and Now

Many centuries ago, humans learned to ride on the backs of animals to make travel faster, more efficient (especially with loads). After this the connection was made that a rock or...
heuristic algo

How Anti-virus Heuristic Detection Works

Metamorphic coding of a virus will not automatically protect against detection by heuristic analysis, though in some cases it is enough to prevent discovery by these methods. Where polymorphic code is...
social network

Staying Safe on Social Networks

“We are what we pretend to be, so we must be careful about what we pretend to be.” (Mother Night; Kurt Vonnegut; Fawcett; 1961) It's even easier to be sociable on social media...
tips

9 Tips to Computer Security

With growing dependency on e-commerce, virtually any transaction can be made from literally anywhere. From the quick purchase and delivery of a much sought-after book from a buyer on the other...
online password

How to Strengthen Your Online Passwords

In Ancient Egypt, Words had Power. Names were the most important, potent words of all. At the end of Life, to pass beyond the water and enter the Afterlife it was...
mischa

Mischa Ransomware – Petya’s Best Friend

Overview of Petya ransomware In March, we covered the emergence of Petya trojan-ransomware; an original and dangerous threat. It was very virulent malware as it did not merely encrypt user files and...
protection

How to Protect Your Organisation from Insider Threats

Vulnerability to Insider Compromise Increased dependence on IT and networking in organizations brings both enhanced productivity and efficiency, but also rising parameters of vulnerability. The (now old) adage - the weakest part...
mobile ransomware

Ransomware Goes Mobile

Ransomware is the fastest growing threat online today, raising many millions each year (and not for charity). After infiltrating a system, it encrypts or locks files and demands a ransom be...
identity theft

How to Protect Yourself Against Identity Scams

The IRS have passed the buck again by stating that the recent massive compromise is as a result of customers' own security failure. They are blaming the taxpayer for weak security...
email protection

3 Ways To Protect Your E-mail Address From Spammers

Now, spam is not just a pain in the proverbial processor – it's a real live and kicking threat. Apart from having to constantly clean up the garbage, one careless click...