Ransomeware

DOWNLOAD: Think Like a Cybercriminal _SolarWinds

Cybercriminals are a diverse lot, yet you can spot some patterns and motives across the group. For victims, be they businesses or individuals, the outcome of an encounter can usually be quantified—some sort of loss has occurred. From here, you can start to understand the cybercriminal’s motives. The degree of loss can suggest the motive and operating capability of the cybercriminal, but the type of attack must also be considered.

Children and Technology: A Preventive Measure or an Invasion of Privacy?

In the “Arkangel” episode of the popular series Black Mirror, an overprotective mother decides to implant a chip in her daughter’s brain so she can use her tablet and an app to monitor everything her little girl sees and feels. This system, originally designed as a parental control app, allows the mom not only to see what her child sees, but also monitor her emotions and moods, and even “filter” images that

Facebook Password Stealing Apps Found on Android Play Store

Even after many efforts made by Google last year, malicious apps always somehow manage to make their ways into Google app store. Security researchers have now discovered a new piece of malware, dubbed GhostTeam, in at least 56 applications on Google Play Store that is designed to steal Facebook login credentials and aggressively display pop-up advertisements to users. Discovered independently by two cybersecurity firms, Trend Micro and Avast, the malicious apps disguise as various

How Do VPNs Work?

We talk about VPNs (virtual private networks) a lot and how important they are to information security. But we rarely discuss how they work or what they’re doing. So today, we’re going to dive in a little deeper and attempt to visualize the process to get a better understanding of why we all should use VPNs, especially on public networks. VPNs For Beginners VPNs are subscription-based services that encrypt your

DOWNLOAD: RANSOMWARE REPORT: 2017

INTRODUCTION: Ransomware attacks, in which hackers encrypt an organization’s vital data until a ransom is paid, have become a billion dollar cybercrime industry according to the FBI. Ransomware is now widely seen as the single biggest cybersecurity threat to both business and government organizations. In many respects, ransomware is a game changer: It is incredibly easy and inexpensive for criminals to execute global attacks. At the same time, ransomware is

DOWNLOAD: The 7 Types of Highly Effective Hackers

Digital Transformation: is impacting every aspect of business—shaping growth, transforming products, optimizing operations, and empowering employees. But with these extraordinary opportunities comes many questions about how IT leadership can effectively evolve their organizations, while still securing their data against the threat of increasingly severe cyberattacks. THE THREAT LANDSCAPE. The rapidly dissolving IT perimeter has created new targets for hackers. And hackers are becoming much more skilled and organized. As a