Ransomware

Malicious software that holds user data for ransom

danger unaware ts

Cybersecurity is dead – long live cyber awareness

Let's face it: anyone who depends solely on prevention is doomed.

petya ransomware logo

Petya ransomware and NotPetya malware: What you need to know now

NotPetya superficially resembles the Petya ransomware in several ways, but there are a number of important ways in which it's different, and much more dangerous.

cyber security

What the good guys are up against: a roundup of popular attack vectors

To help the defenders know what they’re up against, here are some of the attack vectors that have been frequently used in recent months

cybersecurity ts

5 worst cybersecurity habits with catastrophic consequences

These cybersecurity habits can have devastating effects. Make sure you — and your employees — aren't following them.

ransomware wannacry

What is WannaCry ransomware, how does it infect, and who was responsible?

Stolen government hacking tools, unpatched Windows systems, and shadowy North Korean operatives made WannaCry a perfect ransomware storm.

The rise of ransomware in South Korea

Why has Cerber ransomware focused on South Korea?

Locky Ransomware infects a Windows 10 computer

Surviving ransomware by keeping things simple

Ransomware is a topic everyone knows about, but unless you've experienced a ransomware attack, it's hard to really describe and understand the stress associated with these events.

sniper elite 3 camo

The extortion evolution

Ransomware attacks took a decidedly darker turn over the summer, but far more dangerous AI-based blackmail threats are looming just over the horizon.

07 antivirus

The reality of ransomware

Why every CISO needs to consider a ransomware infection as a likely scenario to include in their business continuity and disaster recovery plans. There are some unique challenges when responding to a ransomware attack that could...

karm

What’s new in ransomware?

Ransomware attacks--and defenses against them--are evolving fast, but enterprises still struggle to keep up.

cyber crime

Putting the cyber in crime

Javvad Malik, security advocate at AlienVault, explains how lower barriers and increased profits have lead to a surge in cybercrime.

ransomware

How ransomware is creating a data backup explosion

As ransomware becomes more common, everyone will need to better understand the different types, how they work, and what their broader effects will be on the IT and IT security industries.

mobile malware

Just say no to Facebook quizzes

Clickbait by any other name is just the same. These quizzes take your personal information, and leave with cookies and malware.

quantum computing KryptAll

A quantum of solace

A digital weapon of mass destruction is just over the horizon. If corporate and government leaders were caught off guard during the recent ransomware attacks, this will truly terrify them.

threat ransomware response

The 5 biggest ransomware attacks of the last 5 years

Ransomware isn't new, but the last few years have seen a remarkable uptick in this particularly nasty genre of attack software. The attacks highlighted here show how it has grown from a curiosity and an annoyance to a major crisis.

phishing threat

How CIOs can avoid the next ransomware attack

A rash of recent ransomware and cyberattacks has shown clearly just how vulnerable many organizations are to inbound phish emails. Here's what CIOs can do to sidestep the Achilles heel of cybersecurity.

ransomware

Measures your business can take to stop ransomware

Learn simple measures your business could implement to prevent the increasing threat of ransomware attacks.

ransomware at your service 4

How does ransomware work? Understanding the economics

Operating a piece of ransomware is really just a business. An illegal business, but a business none the less. And criminals employ standard business practices to maximize profits. Here's how they ply their tricks of the trade.

ipad at the beach

Great big list of cybersecurity resources

Beef up your cybersecurity knowledge with this list of cybersecurity resources, including data threats, data breaches, books, jobs, companies and VC funding.

cybersecurity stock

Security and education in the wake of WannaCry, Petya

To prevent from becoming victims of cyber attacks like WannaCry, enterprises should regularly back up data, patch software and use automated security services.

Load More